Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-2006 (GCVE-0-2023-2006)
Vulnerability from cvelistv5
Published
2023-04-24 00:00
Modified
2024-08-02 06:05
Severity ?
EPSS score ?
Summary
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Linux kernel's RxRPC network protocol |
Version: Fixed in kernel v6.1-rc7 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T06:05:27.118Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { tags: [ "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { tags: [ "x_transferred", ], url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Linux kernel's RxRPC network protocol", vendor: "n/a", versions: [ { status: "affected", version: "Fixed in kernel v6.1-rc7", }, ], }, ], descriptions: [ { lang: "en", value: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "CWE-362", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-06-09T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2023-2006", datePublished: "2023-04-24T00:00:00", dateReserved: "2023-04-12T00:00:00", dateUpdated: "2024-08-02T06:05:27.118Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.10\", \"versionEndExcluding\": \"5.10.157\", \"matchCriteriaId\": \"8C645DEF-D909-4D54-B5C9-B07E5B6EDB36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.15.81\", \"matchCriteriaId\": \"899FBA32-27B2-4660-BC94-C43ED4349EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"6.0.11\", \"matchCriteriaId\": \"BA01D181-8E71-42E1-ACF4-7A5B65006EC8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27227B35-932A-4035-B39F-6A455753C0D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"489D20B9-166F-423D-8C48-A23D3026E33B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4AD592C-222D-4C6F-B176-8145A1A5AFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8603654B-A8A9-4DEB-B0DD-C82E1C885749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C855C933-F271-45E6-8E85-8D7CF2EF1BE6\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.\"}]", id: "CVE-2023-2006", lastModified: "2024-11-21T07:57:45.160", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.0, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 5.9}]}", published: "2023-04-24T21:15:09.283", references: "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2189112\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/3bcd6c7eaa53\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230609-0004/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-439/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2189112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/3bcd6c7eaa53\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230609-0004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-23-439/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2023-2006\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-04-24T21:15:09.283\",\"lastModified\":\"2024-11-21T07:57:45.160\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10\",\"versionEndExcluding\":\"5.10.157\",\"matchCriteriaId\":\"8C645DEF-D909-4D54-B5C9-B07E5B6EDB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.81\",\"matchCriteriaId\":\"899FBA32-27B2-4660-BC94-C43ED4349EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.0.11\",\"matchCriteriaId\":\"BA01D181-8E71-42E1-ACF4-7A5B65006EC8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27227B35-932A-4035-B39F-6A455753C0D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489D20B9-166F-423D-8C48-A23D3026E33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4AD592C-222D-4C6F-B176-8145A1A5AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8603654B-A8A9-4DEB-B0DD-C82E1C885749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C855C933-F271-45E6-8E85-8D7CF2EF1BE6\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2189112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/3bcd6c7eaa53\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230609-0004/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-439/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2189112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/3bcd6c7eaa53\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230609-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-23-439/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}", }, }
suse-su-2023:4731-1
Vulnerability from csaf_suse
Published
2023-12-12 14:14
Modified
2023-12-12 14:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.
- kernel-source: Move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4731,SUSE-SLE-Micro-5.3-2023-4731,SUSE-SLE-Micro-5.4-2023-4731,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4731,SUSE-SLE-Module-RT-15-SP4-2023-4731,openSUSE-Leap-Micro-5.3-2023-4731,openSUSE-Leap-Micro-5.4-2023-4731,openSUSE-SLE-15.4-2023-4731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.\n- Documentation: networking: correct possessive 'its' (bsc#1215458).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]\n- Fix termination state for idr_for_each_entry_ul() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use C syntax highlight in driver.rst (bsc#1215458).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).\n- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.\n- kernel-source: Move provides after sources\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: Release firmware if we have an error in probe (git-fixes).\n- r8152: Run the unload routine if we have errors during probe (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: Spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4731,SUSE-SLE-Micro-5.3-2023-4731,SUSE-SLE-Micro-5.4-2023-4731,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4731,SUSE-SLE-Module-RT-15-SP4-2023-4731,openSUSE-Leap-Micro-5.3-2023-4731,openSUSE-Leap-Micro-5.4-2023-4731,openSUSE-SLE-15.4-2023-4731", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4731-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4731-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234731-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4731-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1189998", url: "https://bugzilla.suse.com/1189998", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216761", url: "https://bugzilla.suse.com/1216761", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:14:11Z", generator: { date: "2023-12-12T14:14:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4731-1", initial_release_date: "2023-12-12T14:14:11Z", revision_history: [ { date: "2023-12-12T14:14:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", product_id: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", product: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", product_id: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP4", product: { name: "SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4730-1
Vulnerability from csaf_suse
Published
2023-12-12 14:12
Modified
2023-12-12 14:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - ALC287 Realtek I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX7602ZM (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS 2024 Zenbooks (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Add support dual speaker for Dell (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: ASUS UM5302LA: Added quirks for cs35L41/10431A83 on i2c bus (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ALSA: usb-audio: add quirk flag to enable native DSD for McIntosh devices (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: SOF: core: Ensure sof_ops_free() is still called when probe never ran (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- NFS: Fix access to page->mapping (bsc#1216788).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PCI: vmd: Correct PCI Header Type Register's multi-function check (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: Fix potential memory leak (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: Refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Disable ASPM for VI w/ all Intel systems (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amd: Move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Reserve fences for VM update (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of RAS err_event_athub (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Clean up clock period code (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: Print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: Rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: Use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: Use struct videomode (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: Fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/i915: Flush WC GGTT only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/msm/dsi: free TX buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free TX buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/ttm: Reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: Remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: Rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: Fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: Fix NO_EOT_PACKET settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: Correct allocated size for contexts (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: Return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: Split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: Support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: Uncore frequency control via TPMI (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: Provide cluster level control (bsc#1217147).
- platform/x86/intel/tpmi: ADD tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: Fix double free reported by Smatch (bsc#1217147).
- platform/x86/intel/tpmi: Process CPU package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: Display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: Move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: Use sysfs API to create attributes (bsc#1217147).
- platform/x86/intel/vsec: Add TPMI ID (bsc#1217147).
- platform/x86/intel/vsec: Enhance and Export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: Support private data (bsc#1217147).
- platform/x86/intel/vsec: Use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: Intel TPMI enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: Fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: Add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: Conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: Prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: Use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-frequency: Move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc/perf/hv-24x7: Update domain value check (bsc#1215931).
- powerpc/vas: Limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing IPL_TYPE_ECKD_DUMP case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kABI for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Clear SVM feature if disabled by BIOS (bsc#1214700).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4730,SUSE-SLE-Micro-5.5-2023-4730,SUSE-SLE-Module-Basesystem-15-SP5-2023-4730,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4730,SUSE-SLE-Module-Legacy-15-SP5-2023-4730,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4730,SUSE-SLE-Product-HA-15-SP5-2023-4730,SUSE-SLE-Product-WE-15-SP5-2023-4730,openSUSE-SLE-15.5-2023-4730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - ALC287 Realtek I2S speaker platform support (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS UX7602ZM (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS 2024 Zenbooks (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Add support dual speaker for Dell (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: ASUS UM5302LA: Added quirks for cs35L41/10431A83 on i2c bus (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ALSA: usb-audio: add quirk flag to enable native DSD for McIntosh devices (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: SOF: core: Ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Documentation: networking: correct possessive 'its' (bsc#1215458).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- Fix termination state for idr_for_each_entry_ul() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- NFS: Fix access to page->mapping (bsc#1216788).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PCI: vmd: Correct PCI Header Type Register's multi-function check (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: Fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: Refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Disable ASPM for VI w/ all Intel systems (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amd: Move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: Remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: Reserve fences for VM update (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of RAS err_event_athub (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Clean up clock period code (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: Print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: Rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: Use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: Use struct videomode (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: Fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/i915: Flush WC GGTT only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/msm/dsi: free TX buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free TX buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/ttm: Reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: Remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: Rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: Fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: Fix NO_EOT_PACKET settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: Correct allocated size for contexts (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: Return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: Split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: Support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: Uncore frequency control via TPMI (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: Provide cluster level control (bsc#1217147).\n- platform/x86/intel/tpmi: ADD tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: Fix double free reported by Smatch (bsc#1217147).\n- platform/x86/intel/tpmi: Process CPU package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: Display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: Move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: Use sysfs API to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: Add TPMI ID (bsc#1217147).\n- platform/x86/intel/vsec: Enhance and Export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: Support private data (bsc#1217147).\n- platform/x86/intel/vsec: Use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: Intel TPMI enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: Fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: Add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: Conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: Prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: Use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-frequency: Move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc/perf/hv-24x7: Update domain value check (bsc#1215931).\n- powerpc/vas: Limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing IPL_TYPE_ECKD_DUMP case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kABI for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Clear SVM feature if disabled by BIOS (bsc#1214700).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4730,SUSE-SLE-Micro-5.5-2023-4730,SUSE-SLE-Module-Basesystem-15-SP5-2023-4730,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4730,SUSE-SLE-Module-Legacy-15-SP5-2023-4730,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4730,SUSE-SLE-Product-HA-15-SP5-2023-4730,SUSE-SLE-Product-WE-15-SP5-2023-4730,openSUSE-SLE-15.5-2023-4730", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4730-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4730-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234730-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4730-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:12:25Z", generator: { date: "2023-12-12T14:12:25Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4730-1", initial_release_date: "2023-12-12T14:12:25Z", revision_history: [ { date: "2023-12-12T14:12:25Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-altera-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-altera-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amd-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amd-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-apm-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-apm-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-apple-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-apple-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-arm-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-arm-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-lg-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-lg-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-syms-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch", product_id: "kernel-devel-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch", product_id: "kernel-docs-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", product_id: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch", product_id: "kernel-macros-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-source-5.14.21-150500.55.39.1.noarch", product_id: "kernel-source-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", product_id: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x", product_id: "kernel-syms-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", product_id: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-syms-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.5", product: { name: "SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4734-1
Vulnerability from csaf_suse
Published
2023-12-12 14:15
Modified
2023-12-12 14:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- doc/readme.suse: adjust heading style (jsc#ped-5021) * underscore all headings as a preparation for markdown conversion. * use title-style capitalization for the document name and sentence-style capitalization for section headings, as recommended in the current suse documentation style guide.
- doc/readme.suse: bring information about compiling up to date (jsc#ped-5021) * when building the kernel, do not mention to initially change the current directory to /usr/src/linux because later description discourages it and specifies to use 'make -c /usr/src/linux'. * avoid writing additional details in parentheses, incorporate them instead properly in the text. * fix the obsolete name of /etc/modprobe.d/unsupported-modules -> /etc/modprobe.d/10-unsupported-modules.conf. * drop a note that a newly built kernel should be added to the boot manager because that normally happens automatically when running 'make install'. * update a link to the kernel module packages manual. * when preparing a build for external modules, mention use of the upstream recommended 'make modules_prepare' instead of a pair of 'make prepare' + 'make scripts'. * fix some typos+grammar.
- doc/readme.suse: bring the overview section up to date (jsc#ped-5021) * update information in the overview section that was no longer accurate. * improve wording and fix some typos+grammar.
- doc/readme.suse: convert the document to markdown (jsc#ped-5021)
- doc/readme.suse: minor content clean up (jsc#ped-5021) * mark the user's build directory as a variable, not a command: 'make -c $(your_build_dir)' -> 'make -c $your_build_dir'. * unify how to get the current directory: 'm=$(pwd)' -> 'm=$pwd'. * 'git' / 'git' -> 'git'.
- doc/readme.suse: reflow text to 80-column width (jsc#ped-5021)
- doc/readme.suse: update information about (un)supported modules (jsc#ped-5021) * update the list of taint flags. convert it to a table that matches the upstream documentation format and describe specifically flags that are related to module support status. * fix some typos and wording.
- doc/readme.suse: update information about config files (jsc#ped-5021) * use version variables to describe a name of the /boot/config-... file instead of using specific example versions which get outdated quickly. * replace removed silentoldconfig with oldconfig. * mention that oldconfig can automatically pick a base config from '/boot/config-$(uname -r)'. * avoid writing additional details in parentheses, incorporate them instead properly in the text.
- doc/readme.suse: update information about custom patches (jsc#ped-5021) * replace mention of various patches.* directories with only patches.suse as the typical location for patches. * replace i386 with x86_64 in the example how to define a config addon. * fix some typos and wording.
- doc/readme.suse: update information about dud (jsc#ped-5021) remove a dead link to description of device update disks found previously on novell.com. replace it with a short section summarizing what dud is and reference the mkdud + mksusecd tools and their documentation for more information.
- doc/readme.suse: update information about module paths (jsc#ped-5021) * use version variables to describe names of the /lib/modules/$version-$release-$flavor/... directories instead of using specific example versions which get outdated quickly. * note: keep the /lib/modules/ prefix instead of using the new /usr/lib/modules/ location for now. the updated readme is expected to be incorporated to various branches that are not yet usrmerged.
- doc/readme.suse: update the references list (jsc#ped-5021) * remove the reference to linux documentation project. it has been inactive for years and mostly contains old manuals that are not relevant for contemporary systems and hardware. * update the name and link to lwn.net. the original name 'linux weekly news' has been deemphasized over time by its authors. * update the link to kernel newbies website. * update the reference to the linux kernel module programming guide. the document has not been updated for over a decade but it looks its content is still relevant for today. * point kernel module packages manual to the current version. * add a reference to suse soliddriver program.
- doc/readme.suse: update title information (jsc#ped-5021) * drop the mention of kernel versions from the readme title. * remove information about the original authors of the document. rely as in case of other readmes on git metadata to get information about all contributions. * strip the table of contents. the document is short and easy to navigate just by scrolling through it.
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page->mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036)
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update metadata patches.suse/s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
Patchnames
SUSE-2023-4734,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4734,openSUSE-SLE-15.5-2023-4734
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).\n- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: add support dual speaker for dell (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- doc/readme.suse: adjust heading style (jsc#ped-5021) * underscore all headings as a preparation for markdown conversion. * use title-style capitalization for the document name and sentence-style capitalization for section headings, as recommended in the current suse documentation style guide.\n- doc/readme.suse: bring information about compiling up to date (jsc#ped-5021) * when building the kernel, do not mention to initially change the current directory to /usr/src/linux because later description discourages it and specifies to use 'make -c /usr/src/linux'. * avoid writing additional details in parentheses, incorporate them instead properly in the text. * fix the obsolete name of /etc/modprobe.d/unsupported-modules -> /etc/modprobe.d/10-unsupported-modules.conf. * drop a note that a newly built kernel should be added to the boot manager because that normally happens automatically when running 'make install'. * update a link to the kernel module packages manual. * when preparing a build for external modules, mention use of the upstream recommended 'make modules_prepare' instead of a pair of 'make prepare' + 'make scripts'. * fix some typos+grammar.\n- doc/readme.suse: bring the overview section up to date (jsc#ped-5021) * update information in the overview section that was no longer accurate. * improve wording and fix some typos+grammar.\n- doc/readme.suse: convert the document to markdown (jsc#ped-5021)\n- doc/readme.suse: minor content clean up (jsc#ped-5021) * mark the user's build directory as a variable, not a command: 'make -c $(your_build_dir)' -> 'make -c $your_build_dir'. * unify how to get the current directory: 'm=$(pwd)' -> 'm=$pwd'. * 'git' / 'git' -> 'git'.\n- doc/readme.suse: reflow text to 80-column width (jsc#ped-5021)\n- doc/readme.suse: update information about (un)supported modules (jsc#ped-5021) * update the list of taint flags. convert it to a table that matches the upstream documentation format and describe specifically flags that are related to module support status. * fix some typos and wording.\n- doc/readme.suse: update information about config files (jsc#ped-5021) * use version variables to describe a name of the /boot/config-... file instead of using specific example versions which get outdated quickly. * replace removed silentoldconfig with oldconfig. * mention that oldconfig can automatically pick a base config from '/boot/config-$(uname -r)'. * avoid writing additional details in parentheses, incorporate them instead properly in the text.\n- doc/readme.suse: update information about custom patches (jsc#ped-5021) * replace mention of various patches.* directories with only patches.suse as the typical location for patches. * replace i386 with x86_64 in the example how to define a config addon. * fix some typos and wording.\n- doc/readme.suse: update information about dud (jsc#ped-5021) remove a dead link to description of device update disks found previously on novell.com. replace it with a short section summarizing what dud is and reference the mkdud + mksusecd tools and their documentation for more information.\n- doc/readme.suse: update information about module paths (jsc#ped-5021) * use version variables to describe names of the /lib/modules/$version-$release-$flavor/... directories instead of using specific example versions which get outdated quickly. * note: keep the /lib/modules/ prefix instead of using the new /usr/lib/modules/ location for now. the updated readme is expected to be incorporated to various branches that are not yet usrmerged.\n- doc/readme.suse: update the references list (jsc#ped-5021) * remove the reference to linux documentation project. it has been inactive for years and mostly contains old manuals that are not relevant for contemporary systems and hardware. * update the name and link to lwn.net. the original name 'linux weekly news' has been deemphasized over time by its authors. * update the link to kernel newbies website. * update the reference to the linux kernel module programming guide. the document has not been updated for over a decade but it looks its content is still relevant for today. * point kernel module packages manual to the current version. * add a reference to suse soliddriver program.\n- doc/readme.suse: update title information (jsc#ped-5021) * drop the mention of kernel versions from the readme title. * remove information about the original authors of the document. rely as in case of other readmes on git metadata to get information about all contributions. * strip the table of contents. the document is short and easy to navigate just by scrolling through it.\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).\n- drm/amdgpu: remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: reserve fences for vm update (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: clean up clock period code (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: use struct videomode (git-fixes).\n- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/i915: flush wc ggtt only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/msm/dsi: free tx buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/ttm: reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- fix x86/mm: print the encryption features in hyperv is disabled\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: correct allocated size for contexts (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nfs: fix access to page->mapping (bsc#1216788).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pci: vmd: correct pci header type register's multi-function check (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).\n- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).\n- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).\n- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: add tpmi id (bsc#1217147).\n- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: support private data (bsc#1217147).\n- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).\n- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) \n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- run scripts/renamepatches for sle15-sp4\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- update metadata patches.suse/s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4734,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4734,openSUSE-SLE-15.5-2023-4734", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4734-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4734-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234734-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4734-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:15:51Z", generator: { date: "2023-12-12T14:15:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4734-1", initial_release_date: "2023-12-12T14:15:51Z", revision_history: [ { date: "2023-12-12T14:15:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", product_id: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", product: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", product_id: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4782-1
Vulnerability from csaf_suse
Published
2023-12-13 12:39
Modified
2023-12-13 12:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
- xhci: loosen rpm as default policy to cover for amd xhc 1.1 (git-fixes).
Patchnames
SUSE-2023-4782,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4782,openSUSE-SLE-15.4-2023-4782
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n- xhci: loosen rpm as default policy to cover for amd xhc 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4782,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4782,openSUSE-SLE-15.4-2023-4782", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4782-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4782-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234782-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4782-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T12:39:46Z", generator: { date: "2023-12-13T12:39:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4782-1", initial_release_date: "2023-12-13T12:39:46Z", revision_history: [ { date: "2023-12-13T12:39:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", product_id: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", product: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", product_id: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4732-1
Vulnerability from csaf_suse
Published
2023-12-12 14:14
Modified
2023-12-12 14:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46813: Fixed SEV-ES local priv escalation (bsc#1212649).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page->mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- quota: fix slow quotaoff (bsc#1216621).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036)
- revert amdgpu patches that caused a regression (bsc#1215802)
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update ath11k hibernation fix patch set (bsc#1207948)
- update metadata s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
Patchnames
SUSE-2023-4732,SUSE-SLE-Micro-5.5-2023-4732,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4732,SUSE-SLE-Module-RT-15-SP5-2023-4732,openSUSE-SLE-15.5-2023-4732
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46813: Fixed SEV-ES local priv escalation (bsc#1212649).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).\n- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: add support dual speaker for dell (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amd: update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).\n- drm/amdgpu: remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: reserve fences for vm update (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: clean up clock period code (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: use struct videomode (git-fixes).\n- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/i915: flush wc ggtt only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/msm/dsi: free tx buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/ttm: reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- fix x86/mm: print the encryption features in hyperv is disabled\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: correct allocated size for contexts (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nfs: fix access to page->mapping (bsc#1216788).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pci: vmd: correct pci header type register's multi-function check (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).\n- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).\n- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).\n- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: add tpmi id (bsc#1217147).\n- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: support private data (bsc#1217147).\n- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).\n- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- quota: fix slow quotaoff (bsc#1216621).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) \n- revert amdgpu patches that caused a regression (bsc#1215802) \n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- run scripts/renamepatches for sle15-sp4\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- update ath11k hibernation fix patch set (bsc#1207948) \n- update metadata s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4732,SUSE-SLE-Micro-5.5-2023-4732,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4732,SUSE-SLE-Module-RT-15-SP5-2023-4732,openSUSE-SLE-15.5-2023-4732", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4732-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4732-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234732-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4732-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1212649", url: "https://bugzilla.suse.com/1212649", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215095", url: "https://bugzilla.suse.com/1215095", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216621", url: "https://bugzilla.suse.com/1216621", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216761", url: "https://bugzilla.suse.com/1216761", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-3777 page", url: "https://www.suse.com/security/cve/CVE-2023-3777/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46813 page", url: "https://www.suse.com/security/cve/CVE-2023-46813/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:14:52Z", generator: { date: "2023-12-12T14:14:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4732-1", initial_release_date: "2023-12-12T14:14:52Z", revision_history: [ { date: "2023-12-12T14:14:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", product: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", product_id: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", product: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", product_id: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", product_id: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.5", product: { name: "SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP5", product: { name: "SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-3777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3777", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3777", url: "https://www.suse.com/security/cve/CVE-2023-3777", }, { category: "external", summary: "SUSE Bug 1215095 for CVE-2023-3777", url: "https://bugzilla.suse.com/1215095", }, { category: "external", summary: "SUSE Bug 1215097 for CVE-2023-3777", url: "https://bugzilla.suse.com/1215097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-3777", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46813", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46813", url: "https://www.suse.com/security/cve/CVE-2023-46813", }, { category: "external", summary: "SUSE Bug 1212649 for CVE-2023-46813", url: "https://bugzilla.suse.com/1212649", }, { category: "external", summary: "SUSE Bug 1216896 for CVE-2023-46813", url: "https://bugzilla.suse.com/1216896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-46813", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4810-1
Vulnerability from csaf_suse
Published
2023-12-13 17:59
Modified
2023-12-13 17:59
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4810,SUSE-SLE-Micro-5.3-2023-4810,SUSE-SLE-Micro-5.4-2023-4810,SUSE-SLE-Module-Basesystem-15-SP4-2023-4810,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4810,SUSE-SLE-Module-Legacy-15-SP4-2023-4810,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4810,SUSE-SLE-Product-HA-15-SP4-2023-4810,SUSE-SLE-Product-WE-15-SP4-2023-4810,openSUSE-Leap-Micro-5.3-2023-4810,openSUSE-Leap-Micro-5.4-2023-4810,openSUSE-SLE-15.4-2023-4810
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use C syntax highlight in driver.rst (bsc#1215458).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).\n- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: Release firmware if we have an error in probe (git-fixes).\n- r8152: Run the unload routine if we have errors during probe (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: Spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4810,SUSE-SLE-Micro-5.3-2023-4810,SUSE-SLE-Micro-5.4-2023-4810,SUSE-SLE-Module-Basesystem-15-SP4-2023-4810,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4810,SUSE-SLE-Module-Legacy-15-SP4-2023-4810,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4810,SUSE-SLE-Product-HA-15-SP4-2023-4810,SUSE-SLE-Product-WE-15-SP4-2023-4810,openSUSE-Leap-Micro-5.3-2023-4810,openSUSE-Leap-Micro-5.4-2023-4810,openSUSE-SLE-15.4-2023-4810", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4810-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4810-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234810-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4810-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T17:59:20Z", generator: { date: "2023-12-13T17:59:20Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4810-1", initial_release_date: "2023-12-13T17:59:20Z", revision_history: [ { date: "2023-12-13T17:59:20Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-altera-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-altera-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amd-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amd-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-apm-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-apm-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-apple-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-apple-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-arm-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-arm-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-lg-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-lg-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.aarch64", product: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64", product_id: "kernel-syms-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch", product_id: "kernel-devel-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150400.24.100.1.noarch", product: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch", product_id: "kernel-docs-5.14.21-150400.24.100.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", product: { name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", product_id: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch", product_id: "kernel-macros-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-source-5.14.21-150400.24.100.2.noarch", product_id: "kernel-source-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", product_id: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", product: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", product_id: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.s390x", product: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x", product_id: "kernel-syms-5.14.21-150400.24.100.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", product_id: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.x86_64", product: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64", product_id: "kernel-syms-5.14.21-150400.24.100.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
ghsa-pvxc-v7pp-fmx4
Vulnerability from github
Published
2023-04-24 21:30
Modified
2024-04-04 03:40
Severity ?
Details
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
{ affected: [], aliases: [ "CVE-2023-2006", ], database_specific: { cwe_ids: [ "CWE-362", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2023-04-24T21:15:09Z", severity: "HIGH", }, details: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", id: "GHSA-pvxc-v7pp-fmx4", modified: "2024-04-04T03:40:13Z", published: "2023-04-24T21:30:30Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-2006", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20230609-0004", }, { type: "WEB", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2023-2006
Vulnerability from fkie_nvd
Published
2023-04-24 21:15
Modified
2024-11-21 07:57
Severity ?
Summary
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/3bcd6c7eaa53 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230609-0004/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-23-439/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
netapp | hci_baseboard_management_controller | h300s | |
netapp | hci_baseboard_management_controller | h410c | |
netapp | hci_baseboard_management_controller | h410s | |
netapp | hci_baseboard_management_controller | h500s | |
netapp | hci_baseboard_management_controller | h700s |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "8C645DEF-D909-4D54-B5C9-B07E5B6EDB36", versionEndExcluding: "5.10.157", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "899FBA32-27B2-4660-BC94-C43ED4349EB5", versionEndExcluding: "5.15.81", versionStartIncluding: "5.11", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "BA01D181-8E71-42E1-ACF4-7A5B65006EC8", versionEndExcluding: "6.0.11", versionStartIncluding: "5.16", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*", matchCriteriaId: "27227B35-932A-4035-B39F-6A455753C0D6", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*", matchCriteriaId: "489D20B9-166F-423D-8C48-A23D3026E33B", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*", matchCriteriaId: "A4AD592C-222D-4C6F-B176-8145A1A5AFEC", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*", matchCriteriaId: "8603654B-A8A9-4DEB-B0DD-C82E1C885749", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*", matchCriteriaId: "C855C933-F271-45E6-8E85-8D7CF2EF1BE6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", }, ], id: "CVE-2023-2006", lastModified: "2024-11-21T07:57:45.160", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-04-24T21:15:09.283", references: [ { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2023-2006
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
Aliases
Aliases
{ GSD: { alias: "CVE-2023-2006", id: "GSD-2023-2006", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-2006", ], details: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", id: "GSD-2023-2006", modified: "2023-12-13T01:20:32.304984Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2023-2006", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Linux kernel's RxRPC network protocol", version: { version_data: [ { version_value: "Fixed in kernel v6.1-rc7", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-362", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { name: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { name: "https://security.netapp.com/advisory/ntap-20230609-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.15.81", versionStartIncluding: "5.11", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "6.0.11", versionStartIncluding: "5.16", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.10.157", versionStartIncluding: "5.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2023-2006", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-362", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", refsource: "MISC", tags: [ "Patch", ], url: "https://github.com/torvalds/linux/commit/3bcd6c7eaa53", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", refsource: "MISC", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2189112", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { name: "https://security.netapp.com/advisory/ntap-20230609-0004/", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20230609-0004/", }, ], }, }, impact: { baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1, impactScore: 5.9, }, }, lastModifiedDate: "2023-08-25T15:23Z", publishedDate: "2023-04-24T21:15Z", }, }, }
wid-sec-w-2023-0968
Vulnerability from csaf_certbund
Published
2023-04-13 22:00
Modified
2024-01-28 23:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0968 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0968.json", }, { category: "self", summary: "WID-SEC-2023-0968 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0968", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-440/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-441/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-442/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2147-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014817.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2148-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014816.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2146-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014812.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2141-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014821.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2140-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014813.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2231-1 vom 2023-05-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014914.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3465 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3465", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3470 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3470", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3490 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3490", }, { category: "external", summary: "Debian Security Advisory DLA-3508 vom 2023-07-27", url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { category: "external", summary: "Debian Security Advisory DSA-5480 vom 2023-08-18", url: "https://lists.debian.org/debian-security-announce/2023/msg00172.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3599-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016152.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3600-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016151.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3601-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016153.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3656-1 vom 2023-09-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016181.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3687-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3683-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016212.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3682-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016213.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3680-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3684-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3681-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016214.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3704-1 vom 2023-09-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016234.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3705-1 vom 2023-09-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3683-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016287.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3600-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016284.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3599-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3704-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016285.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3785-1 vom 2023-09-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3964-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016501.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3971-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3969-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016513.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3988-1 vom 2023-10-05", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4028-1 vom 2023-10-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html", }, { category: "external", summary: "Debian Security Advisory DLA-3623 vom 2023-10-19", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4782-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4810-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4731-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4732-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4734-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017379.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4730-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "external", summary: "DELL Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-01-28T23:00:00.000+00:00", generator: { date: "2024-08-15T17:48:53.104+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0968", initial_release_date: "2023-04-13T22:00:00.000+00:00", revision_history: [ { date: "2023-04-13T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-05-09T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-06T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-07-27T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-08-20T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-09-14T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-18T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-19T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-26T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-03T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-04T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-05T22:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-10T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-19T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-12-13T23:00:00.000+00:00", number: "18", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-12-14T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-28T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "20", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_name", name: "Dell NetWorker vProxy< 19.9.0.4", product: { name: "Dell NetWorker vProxy< 19.9.0.4", product_id: "T032377", product_identification_helper: { cpe: "cpe:/a:dell:networker:vproxy_19.9.0.4", }, }, }, { category: "product_name", name: "Dell NetWorker vProxy< 19.10", product: { name: "Dell NetWorker vProxy< 19.10", product_id: "T032378", product_identification_helper: { cpe: "cpe:/a:dell:networker:vproxy_19.10", }, }, }, ], category: "product_name", name: "NetWorker", }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Es tritt eine Race-Condition beim Verarbeiten von RxRPC-Paketen auf. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2006", }, { cve: "CVE-2023-2007", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese besteht aufgrund eines TOCTOU-Fehlers im DPT i20 Controller Treiber. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2007", }, { cve: "CVE-2023-2008", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese ist auf eine unzureichende Filterung von Benutzereingaben zurückzuführen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern oder beliebigen Programmcode auszuführen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2008", }, { cve: "CVE-2023-2019", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese ist auf einen Fehler beim Managen des Reference-Counts zurückzuführen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2019", }, ], }
WID-SEC-W-2023-0968
Vulnerability from csaf_certbund
Published
2023-04-13 22:00
Modified
2024-01-28 23:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0968 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0968.json", }, { category: "self", summary: "WID-SEC-2023-0968 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0968", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-439/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-440/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-441/", }, { category: "external", summary: "ZDI Advisory vom 2023-04-13", url: "https://www.zerodayinitiative.com/advisories/ZDI-23-442/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2147-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014817.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2148-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014816.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2146-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014812.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2141-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014821.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2140-1 vom 2023-05-09", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014813.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2231-1 vom 2023-05-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014914.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3465 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3465", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3470 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3470", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2023:3490 vom 2023-06-06", url: "https://access.redhat.com/errata/RHSA-2023:3490", }, { category: "external", summary: "Debian Security Advisory DLA-3508 vom 2023-07-27", url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", }, { category: "external", summary: "Debian Security Advisory DSA-5480 vom 2023-08-18", url: "https://lists.debian.org/debian-security-announce/2023/msg00172.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3599-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016152.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3600-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016151.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3601-1 vom 2023-09-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016153.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3656-1 vom 2023-09-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016181.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3687-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3683-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016212.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3682-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016213.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3680-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3684-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3681-1 vom 2023-09-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016214.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3704-1 vom 2023-09-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016234.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3705-1 vom 2023-09-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3683-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016287.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3600-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016284.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3599-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3704-2 vom 2023-09-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016285.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3785-1 vom 2023-09-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3964-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016501.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3971-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3969-1 vom 2023-10-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016513.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:3988-1 vom 2023-10-05", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4028-1 vom 2023-10-10", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html", }, { category: "external", summary: "Debian Security Advisory DLA-3623 vom 2023-10-19", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4782-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4810-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4731-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4732-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4734-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017379.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4730-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "external", summary: "DELL Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-01-28T23:00:00.000+00:00", generator: { date: "2024-08-15T17:48:53.104+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0968", initial_release_date: "2023-04-13T22:00:00.000+00:00", revision_history: [ { date: "2023-04-13T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-05-09T22:00:00.000+00:00", number: "2", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-06T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2023-07-27T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-08-20T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-09-14T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-18T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-19T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-26T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-03T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-04T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-05T22:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-10T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-10-19T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Debian aufgenommen", }, { date: "2023-12-13T23:00:00.000+00:00", number: "18", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-12-14T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-28T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "20", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_name", name: "Dell NetWorker vProxy< 19.9.0.4", product: { name: "Dell NetWorker vProxy< 19.9.0.4", product_id: "T032377", product_identification_helper: { cpe: "cpe:/a:dell:networker:vproxy_19.9.0.4", }, }, }, { category: "product_name", name: "Dell NetWorker vProxy< 19.10", product: { name: "Dell NetWorker vProxy< 19.10", product_id: "T032378", product_identification_helper: { cpe: "cpe:/a:dell:networker:vproxy_19.10", }, }, }, ], category: "product_name", name: "NetWorker", }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Es tritt eine Race-Condition beim Verarbeiten von RxRPC-Paketen auf. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2006", }, { cve: "CVE-2023-2007", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese besteht aufgrund eines TOCTOU-Fehlers im DPT i20 Controller Treiber. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2007", }, { cve: "CVE-2023-2008", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese ist auf eine unzureichende Filterung von Benutzereingaben zurückzuführen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern oder beliebigen Programmcode auszuführen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2008", }, { cve: "CVE-2023-2019", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Linux Kernel. Diese ist auf einen Fehler beim Managen des Reference-Counts zurückzuführen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T032377", "T032378", "2951", "T002207", "67646", "6368", ], }, release_date: "2023-04-13T22:00:00.000+00:00", title: "CVE-2023-2019", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.