Vulnerability from csaf_suse
Published
2023-07-14 11:03
Modified
2023-07-14 11:03
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600). - CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039). - CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). - CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155). - CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842). - CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051). - CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129). - CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154). - CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265). - CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605). - CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606). - CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838). - CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504). - CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494). - CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513). - CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495). The following non-security bugs were fixed: - ACPI: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes). - ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes). - ALSA: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes). - ALSA: hda/realtek: Add Lenovo P3 Tower platform (git-fixes). - ALSA: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes). - ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes). - ALSA: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes). - ALSA: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes). - ALSA: hda/realtek: Add quirk for Clevo NS50AU (git-fixes). - ALSA: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes). - ALSA: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes). - ALSA: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes). - ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes). - ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes). - ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes). - ALSA: oss: avoid missing-prototype warnings (git-fixes). - ALSA: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes). - ALSA: usb-audio: Fix broken resume due to UAC3 power state (git-fixes). - ARM: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes) - ARM: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448). - ARM: dts: Fix erroneous ADS touchscreen polarities (git-fixes). - ARM: dts: vexpress: add missing cache properties (git-fixes). - ASoC: codecs: wsa881x: do not set can_multi_write flag (git-fixes). - ASoC: dwc: limit the number of overrun messages (git-fixes). - ASoC: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes). - ASoC: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes). - ASoC: es8316: Increment max value for ALC Capture Target Volume control (git-fixes). - ASoC: imx-audmix: check return value of devm_kasprintf() (git-fixes). - ASoC: mediatek: mt8173: Fix irq error path (git-fixes). - ASoC: nau8824: Add quirk to active-high jack-detect (git-fixes). - ASoC: simple-card: Add missing of_node_put() in case of error (git-fixes). - ASoC: soc-pcm: test if a BE can be prepared (git-fixes). - ASoC: ssm2602: Add workaround for playback distortions (git-fixes). - Also include kernel-docs build requirements for ALP - Avoid unsuported tar parameter on SLE12 - Bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes). - Bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes). - Bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes). - Bluetooth: hci_qca: fix debugfs registration (git-fixes). - Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158). - Fix usrmerge error (boo#1211796) - Generalize kernel-doc build requirements. - Get module prefix from kmod (bsc#1212835). - HID: google: add jewel USB id (git-fixes). - HID: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes). - HID: wacom: Add error check to wacom_parse_and_register() (git-fixes). - IB/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes) - IB/isert: Fix dead lock in ib_isert (git-fixes) - IB/isert: Fix incorrect release of isert connection (git-fixes) - IB/isert: Fix possible list corruption in CMA handler (git-fixes) - IB/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes) - Input: adxl34x - do not hardcode interrupt trigger type (git-fixes). - Input: drv260x - fix typo in register value define (git-fixes). - Input: drv260x - remove unused .reg_defaults (git-fixes). - Input: drv260x - sleep between polling GO bit (git-fixes). - Input: fix open count when closing inhibited device (git-fixes). - Input: psmouse - fix OOB access in Elantech protocol (git-fixes). - Input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes). - Input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes). - KVM: arm64: Do not hypercall before EL2 init (git-fixes) - KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes) - KVM: arm64: Save PSTATE early on exit (git-fixes) - KVM: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes) - Move obsolete KMP list into a separate file. The list of obsoleted KMPs varies per release, move it out of the spec file. - Move setting %%build_html to config.sh - Move setting %%split_optional to config.sh - Move setting %%supported_modules_check to config.sh - Move the kernel-binary conflicts out of the spec file. Thie list of conflicting packages varies per release. To reduce merge conflicts move the list out of the spec file. - PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes). - PCI: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes). - PCI: Release resource invalidated by coalescing (git-fixes). - PCI: cadence: Fix Gen2 Link Retraining process (git-fixes). - PCI: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes). - PCI: ftpci100: Release the clock resources (git-fixes). - PCI: pciehp: Cancel bringup sequence if card is not present (git-fixes). - PCI: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes). - PCI: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes). - PCI: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes). - PCI: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes). - PCI: rockchip: Set address alignment for endpoint mode (git-fixes). - PCI: rockchip: Use u32 variable to access 32-bit registers (git-fixes). - PCI: rockchip: Write PCI Device ID to correct register (git-fixes). - PCI: vmd: Reset VMD config register between soft reboots (git-fixes). - PM: domains: fix integer overflow issues in genpd_parse_state() (git-fixes). - RDMA/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes) - RDMA/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes) - RDMA/bnxt_re: Fix to remove an unnecessary log (git-fixes) - RDMA/bnxt_re: Fix to remove unnecessary return labels (git-fixes) - RDMA/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes) - RDMA/bnxt_re: Remove unnecessary checks (git-fixes) - RDMA/bnxt_re: Return directly without goto jumps (git-fixes) - RDMA/bnxt_re: Use unique names while registering interrupts (git-fixes) - RDMA/bnxt_re: wraparound mbox producer index (git-fixes) - RDMA/cma: Always set static rate to 0 for RoCE (git-fixes) - RDMA/hns: Fix hns_roce_table_get return value (git-fixes) - RDMA/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes) - RDMA/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes) - RDMA/mlx5: Fix affinity assignment (git-fixes) - RDMA/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes) - RDMA/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253). - RDMA/rtrs: Fix rxe_dealloc_pd warning (git-fixes) - RDMA/rtrs: Fix the last iu->buf leak in err path (git-fixes) - RDMA/rxe: Fix packet length checks (git-fixes) - RDMA/rxe: Fix ref count error in check_rkey() (git-fixes) - RDMA/rxe: Fix rxe_cq_post (git-fixes) - RDMA/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes) - RDMA/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes) - RDMA/rxe: Remove the unused variable obj (git-fixes) - RDMA/rxe: Removed unused name from rxe_task struct (git-fixes) - RDMA/uverbs: Restrict usage of privileged QKEYs (git-fixes) - RDMA/vmw_pvrdma: Remove unnecessary check on wr->opcode (git-fixes) - Remove more packaging cruft for SLE < 12 SP3 - Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes). - Revert 'mtd: rawnand: arasan: Prevent an unsupported configuration' (git-fixes). - Revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes). - SUNRPC: Clean up svc_deferred_class trace events (git-fixes). - Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes). - Trim obsolete KMP list. SLE11 is out of support, we do not need to handle upgrading from SLE11 SP1. - USB: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes). - USB: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes). - USB: dwc3: fix use-after-free on core driver unbind (git-fixes). - USB: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes). - USB: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes). - USB: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes). - USB: dwc3: qcom: Fix potential memory leak (git-fixes). - USB: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes). - USB: dwc3: qcom: fix NULL-deref on suspend (git-fixes). - USB: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes). - USB: gadget: udc: fix NULL dereference in remove() (git-fixes). - USB: hide unused usbfs_notify_suspend/resume functions (git-fixes). - USB: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes). - USB: serial: option: add Quectel EM061KGL series (git-fixes). - USB: typec: ucsi: Fix command cancellation (git-fixes). - USB: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes). - affs: initialize fsdata in affs_truncate() (git-fixes). - amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes). - arm64: Add missing Set/Way CMO encodings (git-fixes). - arm64: Always load shadow stack pointer directly from the task struct (git-fixes) - arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes) - arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes) - arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes) - arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes) - arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes). - arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes). - arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes) - arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes). - arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes). - ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes). - batman-adv: Broken sync while rescheduling delayed work (git-fixes). - bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes). - bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes). - bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes). - bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes). - bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes) - bpf, arm64: Clear prog->jited_len along prog->jited (git-fixes) - bpf, arm64: Feed byte-offset into bpf line info (git-fixes) - bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes) - bpf: Add extra path pointer check to d_path helper (git-fixes). - bpf: Fix UAF in task local storage (bsc#1212564). - bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes). - bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes). - can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes). - can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes). - can: j1939: change j1939_netdev_lock type to mutex (git-fixes). - can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes). - can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes). - can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes). - can: length: fix bitstuffing count (git-fixes). - can: length: fix description of the RRS field (git-fixes). - can: length: make header self contained (git-fixes). - ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540). - cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563). - cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561). - cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563). - clk: Fix memory leak in devm_clk_notifier_register() (git-fixes). - clk: cdce925: check return value of kasprintf() (git-fixes). - clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes). - clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes). - clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes). - clk: keystone: sci-clk: check return value of kasprintf() (git-fixes). - clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes). - clk: si5341: check return value of {devm_}kasprintf() (git-fixes). - clk: si5341: free unused memory on probe failure (git-fixes). - clk: si5341: return error if one synth clock registration fails (git-fixes). - clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes). - clk: ti: clkctrl: check return value of kasprintf() (git-fixes). - clk: vc5: check memory returned by kasprintf() (git-fixes). - clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes). - crypto: marvell/cesa - Fix type mismatch warning (git-fixes). - crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes). - dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes). - dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes). - dmaengine: pl330: rename _start to prevent build error (git-fixes). - drivers: meson: secure-pwrc: always enable DMA domain (git-fixes). - drm/amd/display: Add logging for display MALL refresh setting (git-fixes). - drm/amd/display: Add minimal pipe split transition state (git-fixes). - drm/amd/display: Add wrapper to call planes and stream update (git-fixes). - drm/amd/display: Explicitly specify update type per plane info change (git-fixes). - drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes). - drm/amd/display: Use dc_update_planes_and_stream (git-fixes). - drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes). - drm/amd/display: edp do not add non-edid timings (git-fixes). - drm/amd/display: fix the system hang while disable PSR (git-fixes). - drm/amd/pm: Fix power context allocation in SMU13 (git-fixes). - drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes). - drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes). - drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes). - drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes). - drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes). - drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes). - drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes). - drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes). - drm/ast: Fix ARM compatibility (git-fixes). - drm/bridge: tc358768: always enable HS video mode (git-fixes). - drm/bridge: tc358768: fix PLL parameters computation (git-fixes). - drm/bridge: tc358768: fix PLL target frequency (git-fixes). - drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes). - drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes). - drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes). - drm/exynos: vidi: fix a wrong error return (git-fixes). - drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes). - drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes). - drm/i915/selftests: Add some missing error propagation (git-fixes). - drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes). - drm/i915/selftests: Stop using kthread_stop() (git-fixes). - drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes). - drm/i915: Use 18 fast wake AUX sync len (git-fixes). - drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes). - drm/msm/dp: Free resources after unregistering them (git-fixes). - drm/msm/dpu: correct MERGE_3D length (git-fixes). - drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes). - drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes). - drm/msm: Be more shouty if per-process pgtables are not working (git-fixes). - drm/msm: Set max segment size earlier (git-fixes). - drm/nouveau/dp: check for NULL nv_connector->native_mode (git-fixes). - drm/nouveau: add nv_encoder pointer check for NULL (git-fixes). - drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes). - drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes). - drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes). - drm/radeon: fix possible division-by-zero errors (git-fixes). - drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes). - drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes). - drm/vram-helper: fix function names in vram helper doc (git-fixes). - drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes). - drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes). - dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes). - eeprom: at24: also select REGMAP (git-fixes). - elf: correct note name comment (git-fixes). - ext4: unconditionally enable the i_version counter (bsc#1211299). - extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes). - extcon: Fix kernel doc of property fields to avoid warnings (git-fixes). - extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes). - extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes). - extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes). - extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes). - fbcon: Fix null-ptr-deref in soft_cursor (git-fixes). - fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472) Backporting changes: * replace refcount_read() with atomic_read() - fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489) - fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387). - fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes). - fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes). - fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes). - firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes). - firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes). - fs/jfs: fix shift exponent db_agl2size negative (git-fixes). - fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes). - fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes). - fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes). - fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes). - fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes). - hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes). - hfs/hfsplus: use WARN_ON for sanity check (git-fixes). - hfs: Fix OOB Write in hfs_asc2mac (git-fixes). - hfs: fix OOB Read in __hfs_brec_find (git-fixes). - hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes). - hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes). - hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes). - hwrng: imx-rngc - fix the timeout for init and self check (git-fixes). - hwrng: st - keep clock enabled while hwrng is registered (git-fixes). - i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes). - i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes). - i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes). - i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes). - iavf: remove mask from iavf_irq_enable_queues() (git-fixes). - ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604). - ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes). - ice: Do not double unplug aux on peer initiated reset (git-fixes). - ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes). - ice: Fix DSCP PFC TLV creation (git-fixes). - ice: Fix XDP memory leak when NIC is brought up and down (git-fixes). - ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes). - ice: Fix memory corruption in VF driver (git-fixes). - ice: Ignore EEXIST when setting promisc mode (git-fixes). - ice: Prevent set_channel from changing queues while RDMA active (git-fixes). - ice: Reset FDIR counter in FDIR init stage (git-fixes). - ice: add profile conflict check for AVF FDIR (git-fixes). - ice: block LAN in case of VF to VF offload (git-fixes). - ice: config netdev tc before setting queues number (git-fixes). - ice: copy last block omitted in ice_get_module_eeprom() (git-fixes). - ice: ethtool: Prohibit improper channel config for DCB (git-fixes). - ice: ethtool: advertise 1000M speeds properly (git-fixes). - ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes). - ice: fix wrong fallback logic for FDIR (git-fixes). - ice: handle E822 generic device ID in PLDM header (git-fixes). - ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes). - ice: use bitmap_free instead of devm_kfree (git-fixes). - ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes). - ieee802154: hwsim: Fix possible memory leaks (git-fixes). - ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253). - igb: fix bit_shift to be in [1..8] range (git-fixes). - igb: fix nvm.ops.read() error handling (git-fixes). - igc: Clean the TX buffer and TX descriptor ring (git-fixes). - igc: Fix possible system crash when loading module (git-fixes). - iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes). - iio: accel: fxls8962af: fixup buffer scan element type (git-fixes). - iio: adc: ad7192: Fix internal/external clock selection (git-fixes). - iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes). - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448). - init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448). - init: Provide arch_cpu_finalize_init() (bsc#1212448). - init: Remove check_bugs() leftovers (bsc#1212448). - integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes). - irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes). - irqchip/ftintc010: Mark all function static (git-fixes). - irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes). - jfs: Fix fortify moan in symlink (git-fixes). - kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi - kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base. - kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741). - kprobe: reverse kp->flags when arm_kprobe failed (git-fixes). - kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes). - kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes). - kprobes: Forbid probing on trampoline and BPF code areas (git-fixes). - kprobes: Prohibit probes in gate area (git-fixes). - kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes). - kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes). - lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852). - lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852). - lpfc: Clean up SLI-4 CQE status handling (bsc#1211852). - lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852). - lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852). - lpfc: Enhance congestion statistics collection (bsc#1211852). - lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346). - lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852). - lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852). - mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes). - mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes). - mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes). - media: cec: core: do not set last_initiator if tx in progress (git-fixes). - media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes). - media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes). - media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes). - media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes). - media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes). - media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes). - media: dvb_ca_en50221: fix a size write bug (git-fixes). - media: dvb_demux: fix a bug for the continuity counter (git-fixes). - media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes). - media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes). - memory: brcmstb_dpfe: fix testing array offset after use (git-fixes). - meson saradc: fix clock divider mask length (git-fixes). - mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes). - mfd: pm8008: Fix module autoloading (git-fixes). - mfd: rt5033: Drop rt5033-battery sub-device (git-fixes). - mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes). - mfd: stmfx: Nullify stmfx->vdd in case of error (git-fixes). - mfd: stmpe: Only disable the regulators if they are enabled (git-fixes). - misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes). - misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes). - misc: pci_endpoint_test: Re-init completion for every test (git-fixes). - mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253). - mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes). - mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410). - mm: Move mm_cachep initialization to mm_init() (bsc#1212448). - mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410). - mmc: bcm2835: fix deferred probing (git-fixes). - mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes). - mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes). - mmc: mmci: stm32: fix max busy timeout calculation (git-fixes). - mmc: mtk-sd: fix deferred probing (git-fixes). - mmc: mvsdio: fix deferred probing (git-fixes). - mmc: omap: fix deferred probing (git-fixes). - mmc: omap_hsmmc: fix deferred probing (git-fixes). - mmc: owl: fix deferred probing (git-fixes). - mmc: sdhci-acpi: fix deferred probing (git-fixes). - mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes). - mmc: sdhci-spear: fix deferred probing (git-fixes). - mmc: sh_mmcif: fix deferred probing (git-fixes). - mmc: sunxi: fix deferred probing (git-fixes). - mmc: usdhi60rol0: fix deferred probing (git-fixes). - mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes). - net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253). - net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253). - net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253). - net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253). - net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253). - net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253). - net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253). - net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253). - net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253). - net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253). - net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253). - net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253). - net/mlx5: Do not use already freed action pointer (jsc#SLE-19253). - net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253). - net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253). - net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253). - net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253). - net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253). - net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253). - net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253). - net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253). - net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253). - net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253). - net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253). - net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253). - net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253). - net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253). - net/mlx5: Fix steering rules cleanup (jsc#SLE-19253). - net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253). - net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253). - net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253). - net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253). - net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253). - net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253). - net/mlx5: SF, Drain health before removing device (jsc#SLE-19253). - net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253). - net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253). - net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253). - net/mlx5: add IFC bits for bypassing port select flow table (git-fixes) - net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253). - net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253). - net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253). - net/mlx5: fs, fail conflicting actions (jsc#SLE-19253). - net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253). - net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253). - net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253). - net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253). - net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253). - net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253). - net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253). - net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253). - net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253). - net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253). - net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253). - net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253). - net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253). - net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253). - net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253). - net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253). - net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253). - net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253). - net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253). - net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253). - net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253). - net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253). - net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253). - net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253). - net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253). - net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253). - net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253). - net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253). - net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253). - net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253). - net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253). - net/net_failover: fix txq exceeding warning (git-fixes). - net/sched: fix initialization order when updating chain 0 head (git-fixes). - net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes). - net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes). - net: ena: Account for the number of processed bytes in XDP (git-fixes). - net: ena: Do not register memory info on XDP exchange (git-fixes). - net: ena: Fix rx_copybreak value update (git-fixes). - net: ena: Fix toeplitz initial hash value (git-fixes). - net: ena: Set default value for RX interrupt moderation (git-fixes). - net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes). - net: ena: Use bitmask to indicate packet redirection (git-fixes). - net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes). - net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes). - net: hns3: fix reset delay time to avoid configuration timeout (git-fixes). - net: hns3: fix sending pfc frames after reset issue (git-fixes). - net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes). - net: mlx5: eliminate anonymous module_init & module_exit (jsc#SLE-19253). - net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes). - net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes). - nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes). - nfp: only report pause frame configuration for physical device (git-fixes). - nilfs2: fix buffer corruption due to concurrent device reads (git-fixes). - nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes). - nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes). - nouveau: fix client work fence deletion race (git-fixes). - nvme-core: fix dev_pm_qos memleak (git-fixes). - nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes). - nvme-core: fix memory leak in dhchap_secret_store (git-fixes). - nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes). - nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes). - ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes). - ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes). - ocfs2: fix non-auto defrag path not working issue (git-fixes). - octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes). - octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes). - octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes). - octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes). - pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes). - pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes). - pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes). - pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes). - platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes). - platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes). - platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes). - platform/x86: think-lmi: Correct NVME password handling (git-fixes). - platform/x86: think-lmi: Correct System password interface (git-fixes). - platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes). - platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes). - power: supply: Fix logic checking if system is running from battery (git-fixes). - power: supply: Ratelimit no data debug output (git-fixes). - power: supply: ab8500: Fix external_power_changed race (git-fixes). - power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes). - power: supply: sc27xx: Fix external_power_changed race (git-fixes). - powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869). - powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729). - powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662). - powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701). - powerpc/purgatory: remove PGO flags (bsc#1194869). - powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869). - powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662). - powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662). - pstore/ram: Add check for kstrdup (git-fixes). - qed/qede: Fix scheduling while atomic (git-fixes). - radeon: avoid double free in ci_dpm_init() (git-fixes). - rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes). - regmap: Account for register length when chunking (git-fixes). - regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes). - regulator: Fix error checking for debugfs_create_dir (git-fixes). - regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes). - regulator: core: Streamline debugfs operations (git-fixes). - regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes). - regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes). - reiserfs: Add missing calls to reiserfs_security_free() (git-fixes). - reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes). - revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes). - rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE. - rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm - rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435) - rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes). - s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592). - s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892). - s390/pkey: zeroize key blobs (git-fixes bsc#1212619). - scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes). - scsi: stex: Fix gcc 13 warnings (git-fixes). - selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes). - serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes). - serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes). - serial: 8250: omap: Fix freeing of resources on failed register (git-fixes). - serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes). - serial: atmel: do not enable IRQs prematurely (git-fixes). - serial: lantiq: add missing interrupt ack (git-fixes). - sfc: disable RXFCS and RXALL features by default (git-fixes). - signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861). - soc/fsl/qe: fix usb.c build errors (git-fixes). - soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes). - soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes). - spi: dw: Round of n_bytes to power of 2 (git-fixes). - spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes). - spi: lpspi: disable lpspi module irq in DMA mode (git-fixes). - spi: qup: Request DMA before enabling clocks (git-fixes). - spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes). - spi: tegra210-quad: Fix combined sequence (bsc#1212584) - spi: tegra210-quad: Fix iterator outside loop (git-fixes). - spi: tegra210-quad: Multi-cs support (bsc#1212584) - squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes). - staging: octeon: delete my name from TODO contact (git-fixes). - supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931) - test_firmware: Use kstrtobool() instead of strtobool() (git-fixes). - test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes). - test_firmware: prevent race conditions by a correct implementation of locking (git-fixes). - test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes). - thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes). - thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes). - tls: Skip tls_append_frag on zero copy size (git-fixes). - tools: bpftool: Remove invalid \' json escape (git-fixes). - tpm, tpm_tis: Request threaded interrupt handler (git-fixes). - tracing/histograms: Allow variables to have some modifiers (git-fixes). - tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes). - tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes). - tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350). - tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes). - tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350). - tty: serial: imx: fix rs485 rx after tx (git-fixes). - tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes). - tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes). - usrmerge: Adjust module path in the kernel sources (bsc#1212835). - usrmerge: Compatibility with earlier rpm (boo#1211796) - vdpa/mlx5: Directly assign memory key (jsc#SLE-19253). - vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253). - vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253). - vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253). - vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253). - w1: fix loop in w1_fini() (git-fixes). - w1: w1_therm: fix locking behavior in convert_t (git-fixes). - watchdog: menz069_wdt: fix watchdog initialisation (git-fixes). - wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes). - wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes). - wifi: ath9k: convert msecs to jiffies where needed (git-fixes). - wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes). - wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes). - wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes). - wifi: b43: fix incorrect __packed annotation (git-fixes). - wifi: cfg80211: fix locking in regulatory disconnect (git-fixes). - wifi: cfg80211: fix locking in sched scan stop work (git-fixes). - wifi: cfg80211: rewrite merging of inherited elements (git-fixes). - wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes). - wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes). - wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes). - wifi: mac80211: simplify chanctx allocation (git-fixes). - wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes). - wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes). - wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes). - wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes). - wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes). - wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes). - wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes). - wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes). - writeback: fix dereferencing NULL mapping->host on writeback_page_template (git-fixes). - x86/build: Avoid relocation information in final vmlinux (bsc#1187829). - x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448). - x86/fpu: Mark init functions __init (bsc#1212448). - x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448). - x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448). - x86/init: Initialize signal frame size late (bsc#1212448). - x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes). - x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes). - x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes). - x86/microcode: Print previous version of microcode after reload (git-fixes). - x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes). - x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes). - x86/mm: Initialize text poking earlier (bsc#1212448). - x86/mm: Use mm_alloc() in poking_init() (bsc#1212448). - x86/mm: fix poking_init() for Xen PV guests (git-fixes). - x86/sgx: Fix race between reclaimer and page fault handler (git-fixes). - x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes). - x86/xen: fix secondary processor fpu initialization (bsc#1212869). - xfs: fix rm_offset flag handling in rmap keys (git-fixes). - xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
Patchnames
SUSE-2023-2831,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2831,openSUSE-SLE-15.4-2023-2831
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for the Linux Kernel",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).\n- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).\n- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).\n- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).\n- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).\n- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).\n- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).\n- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).\n- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).\n- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).\n- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).\n- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).\n- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).\n- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).\n\nThe following non-security bugs were fixed:\n\n- ACPI: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).\n- ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).\n- ALSA: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).\n- ALSA: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).\n- ALSA: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).\n- ALSA: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).\n- ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).\n- ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).\n- ALSA: oss: avoid missing-prototype warnings (git-fixes).\n- ALSA: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).\n- ALSA: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).\n- ARM: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)\n- ARM: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).\n- ARM: dts: Fix erroneous ADS touchscreen polarities (git-fixes).\n- ARM: dts: vexpress: add missing cache properties (git-fixes).\n- ASoC: codecs: wsa881x: do not set can_multi_write flag (git-fixes).\n- ASoC: dwc: limit the number of overrun messages (git-fixes).\n- ASoC: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).\n- ASoC: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).\n- ASoC: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).\n- ASoC: imx-audmix: check return value of devm_kasprintf() (git-fixes).\n- ASoC: mediatek: mt8173: Fix irq error path (git-fixes).\n- ASoC: nau8824: Add quirk to active-high jack-detect (git-fixes).\n- ASoC: simple-card: Add missing of_node_put() in case of error (git-fixes).\n- ASoC: soc-pcm: test if a BE can be prepared (git-fixes).\n- ASoC: ssm2602: Add workaround for playback distortions (git-fixes).\n- Also include kernel-docs build requirements for ALP\n- Avoid unsuported tar parameter on SLE12\n- Bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).\n- Bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).\n- Bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).\n- Bluetooth: hci_qca: fix debugfs registration (git-fixes).\n- Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).\n- Fix usrmerge error (boo#1211796)\n- Generalize kernel-doc build requirements.\n- Get module prefix from kmod (bsc#1212835).\n- HID: google: add jewel USB id (git-fixes).\n- HID: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).\n- HID: wacom: Add error check to wacom_parse_and_register() (git-fixes).\n- IB/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)\n- IB/isert: Fix dead lock in ib_isert (git-fixes)\n- IB/isert: Fix incorrect release of isert connection (git-fixes)\n- IB/isert: Fix possible list corruption in CMA handler (git-fixes)\n- IB/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)\n- Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).\n- Input: drv260x - fix typo in register value define (git-fixes).\n- Input: drv260x - remove unused .reg_defaults (git-fixes).\n- Input: drv260x - sleep between polling GO bit (git-fixes).\n- Input: fix open count when closing inhibited device (git-fixes).\n- Input: psmouse - fix OOB access in Elantech protocol (git-fixes).\n- Input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).\n- Input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).\n- KVM: arm64: Do not hypercall before EL2 init (git-fixes)\n- KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)\n- KVM: arm64: Save PSTATE early on exit (git-fixes)\n- KVM: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)\n- Move obsolete KMP list into a separate file. The list of obsoleted KMPs varies per release, move it out of the spec file.\n- Move setting %%build_html to config.sh\n- Move setting %%split_optional to config.sh\n- Move setting %%supported_modules_check to config.sh\n- Move the kernel-binary conflicts out of the spec file. Thie list of conflicting packages varies per release. To reduce merge conflicts move the list out of the spec file.\n- PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).\n- PCI: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).\n- PCI: Release resource invalidated by coalescing (git-fixes).\n- PCI: cadence: Fix Gen2 Link Retraining process (git-fixes).\n- PCI: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).\n- PCI: ftpci100: Release the clock resources (git-fixes).\n- PCI: pciehp: Cancel bringup sequence if card is not present (git-fixes).\n- PCI: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).\n- PCI: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).\n- PCI: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).\n- PCI: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).\n- PCI: rockchip: Set address alignment for endpoint mode (git-fixes).\n- PCI: rockchip: Use u32 variable to access 32-bit registers (git-fixes).\n- PCI: rockchip: Write PCI Device ID to correct register (git-fixes).\n- PCI: vmd: Reset VMD config register between soft reboots (git-fixes).\n- PM: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).\n- RDMA/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)\n- RDMA/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)\n- RDMA/bnxt_re: Fix to remove an unnecessary log (git-fixes)\n- RDMA/bnxt_re: Fix to remove unnecessary return labels (git-fixes)\n- RDMA/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)\n- RDMA/bnxt_re: Remove unnecessary checks (git-fixes)\n- RDMA/bnxt_re: Return directly without goto jumps (git-fixes)\n- RDMA/bnxt_re: Use unique names while registering interrupts (git-fixes)\n- RDMA/bnxt_re: wraparound mbox producer index (git-fixes)\n- RDMA/cma: Always set static rate to 0 for RoCE (git-fixes)\n- RDMA/hns: Fix hns_roce_table_get return value (git-fixes)\n- RDMA/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)\n- RDMA/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)\n- RDMA/mlx5: Fix affinity assignment (git-fixes)\n- RDMA/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)\n- RDMA/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).\n- RDMA/rtrs: Fix rxe_dealloc_pd warning (git-fixes)\n- RDMA/rtrs: Fix the last iu->buf leak in err path (git-fixes)\n- RDMA/rxe: Fix packet length checks (git-fixes)\n- RDMA/rxe: Fix ref count error in check_rkey() (git-fixes)\n- RDMA/rxe: Fix rxe_cq_post (git-fixes)\n- RDMA/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)\n- RDMA/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)\n- RDMA/rxe: Remove the unused variable obj (git-fixes)\n- RDMA/rxe: Removed unused name from rxe_task struct (git-fixes)\n- RDMA/uverbs: Restrict usage of privileged QKEYs (git-fixes)\n- RDMA/vmw_pvrdma: Remove unnecessary check on wr->opcode (git-fixes)\n- Remove more packaging cruft for SLE < 12 SP3\n- Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).\n- Revert 'mtd: rawnand: arasan: Prevent an unsupported configuration' (git-fixes).\n- Revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).\n- SUNRPC: Clean up svc_deferred_class trace events (git-fixes).\n- Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).\n- Trim obsolete KMP list. SLE11 is out of support, we do not need to handle upgrading from SLE11 SP1.\n- USB: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).\n- USB: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).\n- USB: dwc3: fix use-after-free on core driver unbind (git-fixes).\n- USB: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).\n- USB: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).\n- USB: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).\n- USB: dwc3: qcom: Fix potential memory leak (git-fixes).\n- USB: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).\n- USB: dwc3: qcom: fix NULL-deref on suspend (git-fixes).\n- USB: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).\n- USB: gadget: udc: fix NULL dereference in remove() (git-fixes).\n- USB: hide unused usbfs_notify_suspend/resume functions (git-fixes).\n- USB: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).\n- USB: serial: option: add Quectel EM061KGL series (git-fixes).\n- USB: typec: ucsi: Fix command cancellation (git-fixes).\n- USB: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).\n- affs: initialize fsdata in affs_truncate() (git-fixes).\n- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).\n- arm64: Add missing Set/Way CMO encodings (git-fixes).\n- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)\n- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)\n- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)\n- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)\n- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)\n- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).\n- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).\n- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)\n- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).\n- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).\n- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).\n- batman-adv: Broken sync while rescheduling delayed work (git-fixes).\n- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).\n- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).\n- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).\n- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).\n- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)\n- bpf, arm64: Clear prog->jited_len along prog->jited (git-fixes)\n- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)\n- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)\n- bpf: Add extra path pointer check to d_path helper (git-fixes).\n- bpf: Fix UAF in task local storage (bsc#1212564).\n- bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).\n- bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).\n- can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).\n- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).\n- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).\n- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).\n- can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).\n- can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).\n- can: length: fix bitstuffing count (git-fixes).\n- can: length: fix description of the RRS field (git-fixes).\n- can: length: make header self contained (git-fixes).\n- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).\n- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).\n- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).\n- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).\n- clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).\n- clk: cdce925: check return value of kasprintf() (git-fixes).\n- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).\n- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).\n- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).\n- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).\n- clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).\n- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).\n- clk: si5341: free unused memory on probe failure (git-fixes).\n- clk: si5341: return error if one synth clock registration fails (git-fixes).\n- clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).\n- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).\n- clk: vc5: check memory returned by kasprintf() (git-fixes).\n- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).\n- crypto: marvell/cesa - Fix type mismatch warning (git-fixes).\n- crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).\n- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).\n- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).\n- dmaengine: pl330: rename _start to prevent build error (git-fixes).\n- drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).\n- drm/amd/display: Add logging for display MALL refresh setting (git-fixes).\n- drm/amd/display: Add minimal pipe split transition state (git-fixes).\n- drm/amd/display: Add wrapper to call planes and stream update (git-fixes).\n- drm/amd/display: Explicitly specify update type per plane info change (git-fixes).\n- drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).\n- drm/amd/display: Use dc_update_planes_and_stream (git-fixes).\n- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).\n- drm/amd/display: edp do not add non-edid timings (git-fixes).\n- drm/amd/display: fix the system hang while disable PSR (git-fixes).\n- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).\n- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).\n- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).\n- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).\n- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).\n- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).\n- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).\n- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).\n- drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).\n- drm/ast: Fix ARM compatibility (git-fixes).\n- drm/bridge: tc358768: always enable HS video mode (git-fixes).\n- drm/bridge: tc358768: fix PLL parameters computation (git-fixes).\n- drm/bridge: tc358768: fix PLL target frequency (git-fixes).\n- drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).\n- drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).\n- drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).\n- drm/exynos: vidi: fix a wrong error return (git-fixes).\n- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).\n- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).\n- drm/i915/selftests: Add some missing error propagation (git-fixes).\n- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).\n- drm/i915/selftests: Stop using kthread_stop() (git-fixes).\n- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).\n- drm/i915: Use 18 fast wake AUX sync len (git-fixes).\n- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).\n- drm/msm/dp: Free resources after unregistering them (git-fixes).\n- drm/msm/dpu: correct MERGE_3D length (git-fixes).\n- drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).\n- drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).\n- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).\n- drm/msm: Set max segment size earlier (git-fixes).\n- drm/nouveau/dp: check for NULL nv_connector->native_mode (git-fixes).\n- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).\n- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).\n- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).\n- drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).\n- drm/radeon: fix possible division-by-zero errors (git-fixes).\n- drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).\n- drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).\n- drm/vram-helper: fix function names in vram helper doc (git-fixes).\n- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).\n- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).\n- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).\n- eeprom: at24: also select REGMAP (git-fixes).\n- elf: correct note name comment (git-fixes).\n- ext4: unconditionally enable the i_version counter (bsc#1211299).\n- extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).\n- extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).\n- extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).\n- extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).\n- extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).\n- extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).\n- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).\n- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472) Backporting changes: \t* replace refcount_read() with atomic_read()\n- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)\n- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).\n- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).\n- fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).\n- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).\n- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).\n- firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).\n- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).\n- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).\n- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).\n- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).\n- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).\n- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).\n- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).\n- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).\n- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).\n- hfs: fix OOB Read in __hfs_brec_find (git-fixes).\n- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).\n- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).\n- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).\n- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).\n- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).\n- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).\n- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).\n- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).\n- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).\n- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).\n- ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).\n- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).\n- ice: Do not double unplug aux on peer initiated reset (git-fixes).\n- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).\n- ice: Fix DSCP PFC TLV creation (git-fixes).\n- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).\n- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).\n- ice: Fix memory corruption in VF driver (git-fixes).\n- ice: Ignore EEXIST when setting promisc mode (git-fixes).\n- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).\n- ice: Reset FDIR counter in FDIR init stage (git-fixes).\n- ice: add profile conflict check for AVF FDIR (git-fixes).\n- ice: block LAN in case of VF to VF offload (git-fixes).\n- ice: config netdev tc before setting queues number (git-fixes).\n- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).\n- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).\n- ice: ethtool: advertise 1000M speeds properly (git-fixes).\n- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).\n- ice: fix wrong fallback logic for FDIR (git-fixes).\n- ice: handle E822 generic device ID in PLDM header (git-fixes).\n- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).\n- ice: use bitmap_free instead of devm_kfree (git-fixes).\n- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).\n- ieee802154: hwsim: Fix possible memory leaks (git-fixes).\n- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).\n- igb: fix bit_shift to be in [1..8] range (git-fixes).\n- igb: fix nvm.ops.read() error handling (git-fixes).\n- igc: Clean the TX buffer and TX descriptor ring (git-fixes).\n- igc: Fix possible system crash when loading module (git-fixes).\n- iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).\n- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).\n- iio: adc: ad7192: Fix internal/external clock selection (git-fixes).\n- iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).\n- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).\n- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).\n- init: Provide arch_cpu_finalize_init() (bsc#1212448).\n- init: Remove check_bugs() leftovers (bsc#1212448).\n- integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).\n- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).\n- irqchip/ftintc010: Mark all function static (git-fixes).\n- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).\n- jfs: Fix fortify moan in symlink (git-fixes).\n- kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi\n- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.\n- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).\n- kprobe: reverse kp->flags when arm_kprobe failed (git-fixes).\n- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).\n- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).\n- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).\n- kprobes: Prohibit probes in gate area (git-fixes).\n- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).\n- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).\n- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).\n- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).\n- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).\n- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).\n- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).\n- lpfc: Enhance congestion statistics collection (bsc#1211852).\n- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).\n- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).\n- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).\n- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).\n- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).\n- mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).\n- media: cec: core: do not set last_initiator if tx in progress (git-fixes).\n- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).\n- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).\n- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).\n- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).\n- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).\n- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).\n- media: dvb_ca_en50221: fix a size write bug (git-fixes).\n- media: dvb_demux: fix a bug for the continuity counter (git-fixes).\n- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).\n- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).\n- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).\n- meson saradc: fix clock divider mask length (git-fixes).\n- mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).\n- mfd: pm8008: Fix module autoloading (git-fixes).\n- mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).\n- mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).\n- mfd: stmfx: Nullify stmfx->vdd in case of error (git-fixes).\n- mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).\n- misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).\n- misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).\n- misc: pci_endpoint_test: Re-init completion for every test (git-fixes).\n- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).\n- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).\n- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).\n- mm: Move mm_cachep initialization to mm_init() (bsc#1212448).\n- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).\n- mmc: bcm2835: fix deferred probing (git-fixes).\n- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).\n- mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).\n- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).\n- mmc: mtk-sd: fix deferred probing (git-fixes).\n- mmc: mvsdio: fix deferred probing (git-fixes).\n- mmc: omap: fix deferred probing (git-fixes).\n- mmc: omap_hsmmc: fix deferred probing (git-fixes).\n- mmc: owl: fix deferred probing (git-fixes).\n- mmc: sdhci-acpi: fix deferred probing (git-fixes).\n- mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).\n- mmc: sdhci-spear: fix deferred probing (git-fixes).\n- mmc: sh_mmcif: fix deferred probing (git-fixes).\n- mmc: sunxi: fix deferred probing (git-fixes).\n- mmc: usdhi60rol0: fix deferred probing (git-fixes).\n- mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).\n- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).\n- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).\n- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).\n- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).\n- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).\n- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).\n- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).\n- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).\n- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).\n- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).\n- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).\n- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).\n- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).\n- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).\n- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).\n- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).\n- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).\n- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).\n- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).\n- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).\n- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).\n- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).\n- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).\n- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).\n- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).\n- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).\n- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).\n- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).\n- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).\n- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).\n- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).\n- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).\n- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).\n- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).\n- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).\n- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).\n- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).\n- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).\n- net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)\n- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).\n- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).\n- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).\n- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).\n- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).\n- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).\n- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).\n- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).\n- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).\n- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).\n- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).\n- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).\n- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).\n- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).\n- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).\n- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).\n- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).\n- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).\n- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).\n- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).\n- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).\n- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).\n- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).\n- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).\n- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).\n- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).\n- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).\n- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).\n- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).\n- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).\n- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).\n- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).\n- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).\n- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).\n- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).\n- net/net_failover: fix txq exceeding warning (git-fixes).\n- net/sched: fix initialization order when updating chain 0 head (git-fixes).\n- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).\n- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).\n- net: ena: Account for the number of processed bytes in XDP (git-fixes).\n- net: ena: Do not register memory info on XDP exchange (git-fixes).\n- net: ena: Fix rx_copybreak value update (git-fixes).\n- net: ena: Fix toeplitz initial hash value (git-fixes).\n- net: ena: Set default value for RX interrupt moderation (git-fixes).\n- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).\n- net: ena: Use bitmask to indicate packet redirection (git-fixes).\n- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).\n- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).\n- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).\n- net: hns3: fix sending pfc frames after reset issue (git-fixes).\n- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).\n- net: mlx5: eliminate anonymous module_init & module_exit (jsc#SLE-19253).\n- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).\n- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).\n- nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).\n- nfp: only report pause frame configuration for physical device (git-fixes).\n- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).\n- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).\n- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).\n- nouveau: fix client work fence deletion race (git-fixes).\n- nvme-core: fix dev_pm_qos memleak (git-fixes).\n- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).\n- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).\n- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).\n- nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).\n- ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).\n- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).\n- ocfs2: fix non-auto defrag path not working issue (git-fixes).\n- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).\n- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).\n- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).\n- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).\n- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).\n- pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).\n- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).\n- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).\n- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).\n- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).\n- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).\n- platform/x86: think-lmi: Correct NVME password handling (git-fixes).\n- platform/x86: think-lmi: Correct System password interface (git-fixes).\n- platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).\n- platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).\n- power: supply: Fix logic checking if system is running from battery (git-fixes).\n- power: supply: Ratelimit no data debug output (git-fixes).\n- power: supply: ab8500: Fix external_power_changed race (git-fixes).\n- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).\n- power: supply: sc27xx: Fix external_power_changed race (git-fixes).\n- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).\n- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).\n- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).\n- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).\n- powerpc/purgatory: remove PGO flags (bsc#1194869).\n- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).\n- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).\n- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).\n- pstore/ram: Add check for kstrdup (git-fixes).\n- qed/qede: Fix scheduling while atomic (git-fixes).\n- radeon: avoid double free in ci_dpm_init() (git-fixes).\n- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).\n- regmap: Account for register length when chunking (git-fixes).\n- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).\n- regulator: Fix error checking for debugfs_create_dir (git-fixes).\n- regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).\n- regulator: core: Streamline debugfs operations (git-fixes).\n- regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).\n- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).\n- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).\n- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).\n- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).\n- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.\n- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm\n- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)\n- rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).\n- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).\n- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).\n- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).\n- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).\n- scsi: stex: Fix gcc 13 warnings (git-fixes).\n- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).\n- serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).\n- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).\n- serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).\n- serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).\n- serial: atmel: do not enable IRQs prematurely (git-fixes).\n- serial: lantiq: add missing interrupt ack (git-fixes).\n- sfc: disable RXFCS and RXALL features by default (git-fixes).\n- signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).\n- soc/fsl/qe: fix usb.c build errors (git-fixes).\n- soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).\n- soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).\n- spi: dw: Round of n_bytes to power of 2 (git-fixes).\n- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).\n- spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).\n- spi: qup: Request DMA before enabling clocks (git-fixes).\n- spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).\n- spi: tegra210-quad: Fix combined sequence (bsc#1212584)\n- spi: tegra210-quad: Fix iterator outside loop (git-fixes).\n- spi: tegra210-quad: Multi-cs support (bsc#1212584)\n- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).\n- staging: octeon: delete my name from TODO contact (git-fixes).\n- supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)\n- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).\n- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).\n- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).\n- test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).\n- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).\n- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).\n- tls: Skip tls_append_frag on zero copy size (git-fixes).\n- tools: bpftool: Remove invalid \\' json escape (git-fixes).\n- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).\n- tracing/histograms: Allow variables to have some modifiers (git-fixes).\n- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).\n- tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).\n- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).\n- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).\n- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).\n- tty: serial: imx: fix rs485 rx after tx (git-fixes).\n- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).\n- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).\n- usrmerge: Adjust module path in the kernel sources (bsc#1212835).\n- usrmerge: Compatibility with earlier rpm (boo#1211796)\n- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).\n- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).\n- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).\n- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).\n- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).\n- w1: fix loop in w1_fini() (git-fixes).\n- w1: w1_therm: fix locking behavior in convert_t (git-fixes).\n- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).\n- wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).\n- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).\n- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).\n- wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).\n- wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).\n- wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).\n- wifi: b43: fix incorrect __packed annotation (git-fixes).\n- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).\n- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).\n- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).\n- wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).\n- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).\n- wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).\n- wifi: mac80211: simplify chanctx allocation (git-fixes).\n- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).\n- wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).\n- wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).\n- wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).\n- wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).\n- wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).\n- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).\n- wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).\n- writeback: fix dereferencing NULL mapping->host on writeback_page_template (git-fixes).\n- x86/build: Avoid relocation information in final vmlinux (bsc#1187829).\n- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).\n- x86/fpu: Mark init functions __init (bsc#1212448).\n- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).\n- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).\n- x86/init: Initialize signal frame size late (bsc#1212448).\n- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).\n- x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).\n- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes).\n- x86/microcode: Print previous version of microcode after reload (git-fixes).\n- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).\n- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).\n- x86/mm: Initialize text poking earlier (bsc#1212448).\n- x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).\n- x86/mm: fix poking_init() for Xen PV guests (git-fixes).\n- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).\n- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).\n- x86/xen: fix secondary processor fpu initialization (bsc#1212869).\n- xfs: fix rm_offset flag handling in rmap keys (git-fixes).\n- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2023-2831,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2831,openSUSE-SLE-15.4-2023-2831",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2831-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2023:2831-1",
            url: "https://www.suse.com/support/update/announcement/2023/suse-su-20232831-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2023:2831-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1065729",
            url: "https://bugzilla.suse.com/1065729",
         },
         {
            category: "self",
            summary: "SUSE Bug 1152472",
            url: "https://bugzilla.suse.com/1152472",
         },
         {
            category: "self",
            summary: "SUSE Bug 1152489",
            url: "https://bugzilla.suse.com/1152489",
         },
         {
            category: "self",
            summary: "SUSE Bug 1160435",
            url: "https://bugzilla.suse.com/1160435",
         },
         {
            category: "self",
            summary: "SUSE Bug 1187829",
            url: "https://bugzilla.suse.com/1187829",
         },
         {
            category: "self",
            summary: "SUSE Bug 1189998",
            url: "https://bugzilla.suse.com/1189998",
         },
         {
            category: "self",
            summary: "SUSE Bug 1194869",
            url: "https://bugzilla.suse.com/1194869",
         },
         {
            category: "self",
            summary: "SUSE Bug 1205758",
            url: "https://bugzilla.suse.com/1205758",
         },
         {
            category: "self",
            summary: "SUSE Bug 1208410",
            url: "https://bugzilla.suse.com/1208410",
         },
         {
            category: "self",
            summary: "SUSE Bug 1208600",
            url: "https://bugzilla.suse.com/1208600",
         },
         {
            category: "self",
            summary: "SUSE Bug 1209039",
            url: "https://bugzilla.suse.com/1209039",
         },
         {
            category: "self",
            summary: "SUSE Bug 1209367",
            url: "https://bugzilla.suse.com/1209367",
         },
         {
            category: "self",
            summary: "SUSE Bug 1210335",
            url: "https://bugzilla.suse.com/1210335",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211299",
            url: "https://bugzilla.suse.com/1211299",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211346",
            url: "https://bugzilla.suse.com/1211346",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211387",
            url: "https://bugzilla.suse.com/1211387",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211410",
            url: "https://bugzilla.suse.com/1211410",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211796",
            url: "https://bugzilla.suse.com/1211796",
         },
         {
            category: "self",
            summary: "SUSE Bug 1211852",
            url: "https://bugzilla.suse.com/1211852",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212051",
            url: "https://bugzilla.suse.com/1212051",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212129",
            url: "https://bugzilla.suse.com/1212129",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212154",
            url: "https://bugzilla.suse.com/1212154",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212155",
            url: "https://bugzilla.suse.com/1212155",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212158",
            url: "https://bugzilla.suse.com/1212158",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212265",
            url: "https://bugzilla.suse.com/1212265",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212350",
            url: "https://bugzilla.suse.com/1212350",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212448",
            url: "https://bugzilla.suse.com/1212448",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212494",
            url: "https://bugzilla.suse.com/1212494",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212495",
            url: "https://bugzilla.suse.com/1212495",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212504",
            url: "https://bugzilla.suse.com/1212504",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212513",
            url: "https://bugzilla.suse.com/1212513",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212540",
            url: "https://bugzilla.suse.com/1212540",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212561",
            url: "https://bugzilla.suse.com/1212561",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212563",
            url: "https://bugzilla.suse.com/1212563",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212564",
            url: "https://bugzilla.suse.com/1212564",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212584",
            url: "https://bugzilla.suse.com/1212584",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212592",
            url: "https://bugzilla.suse.com/1212592",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212603",
            url: "https://bugzilla.suse.com/1212603",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212605",
            url: "https://bugzilla.suse.com/1212605",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212606",
            url: "https://bugzilla.suse.com/1212606",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212619",
            url: "https://bugzilla.suse.com/1212619",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212701",
            url: "https://bugzilla.suse.com/1212701",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212741",
            url: "https://bugzilla.suse.com/1212741",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212835",
            url: "https://bugzilla.suse.com/1212835",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212838",
            url: "https://bugzilla.suse.com/1212838",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212842",
            url: "https://bugzilla.suse.com/1212842",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212861",
            url: "https://bugzilla.suse.com/1212861",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212869",
            url: "https://bugzilla.suse.com/1212869",
         },
         {
            category: "self",
            summary: "SUSE Bug 1212892",
            url: "https://bugzilla.suse.com/1212892",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1077 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1077/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1249 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1249/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1829 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1829/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-21102 page",
            url: "https://www.suse.com/security/cve/CVE-2023-21102/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3090 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3090/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3111 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3111/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3141 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3141/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3161 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3161/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3212 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3212/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3357 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3357/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3358 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3358/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-3389 page",
            url: "https://www.suse.com/security/cve/CVE-2023-3389/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-35788 page",
            url: "https://www.suse.com/security/cve/CVE-2023-35788/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-35823 page",
            url: "https://www.suse.com/security/cve/CVE-2023-35823/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-35828 page",
            url: "https://www.suse.com/security/cve/CVE-2023-35828/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-35829 page",
            url: "https://www.suse.com/security/cve/CVE-2023-35829/",
         },
      ],
      title: "Security update for the Linux Kernel",
      tracking: {
         current_release_date: "2023-07-14T11:03:30Z",
         generator: {
            date: "2023-07-14T11:03:30Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2023:2831-1",
         initial_release_date: "2023-07-14T11:03:30Z",
         revision_history: [
            {
               date: "2023-07-14T11:03:30Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        product: {
                           name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                           product_id: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                        product: {
                           name: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                           product_id: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                        product: {
                           name: "kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                           product_id: "kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        product: {
                           name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                           product_id: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                        product: {
                           name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                           product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp4",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "openSUSE Leap 15.4",
                        product: {
                           name: "openSUSE Leap 15.4",
                           product_id: "openSUSE Leap 15.4",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:leap:15.4",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.14.21-150400.14.55.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.14.21-150400.14.55.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.14.21-150400.14.55.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
            },
            product_reference: "kernel-source-azure-5.14.21-150400.14.55.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-extra-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-extra-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-optional-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-optional-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.14.21-150400.14.55.1.noarch as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
            },
            product_reference: "kernel-source-azure-5.14.21-150400.14.55.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            },
            product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64 as component of openSUSE Leap 15.4",
               product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            },
            product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2023-1077",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1077",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1077",
               url: "https://www.suse.com/security/cve/CVE-2023-1077",
            },
            {
               category: "external",
               summary: "SUSE Bug 1208600 for CVE-2023-1077",
               url: "https://bugzilla.suse.com/1208600",
            },
            {
               category: "external",
               summary: "SUSE Bug 1208839 for CVE-2023-1077",
               url: "https://bugzilla.suse.com/1208839",
            },
            {
               category: "external",
               summary: "SUSE Bug 1213841 for CVE-2023-1077",
               url: "https://bugzilla.suse.com/1213841",
            },
            {
               category: "external",
               summary: "SUSE Bug 1213842 for CVE-2023-1077",
               url: "https://bugzilla.suse.com/1213842",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1077",
      },
      {
         cve: "CVE-2023-1249",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1249",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free flaw was found in the Linux kernel's core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1249",
               url: "https://www.suse.com/security/cve/CVE-2023-1249",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209039 for CVE-2023-1249",
               url: "https://bugzilla.suse.com/1209039",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-1249",
      },
      {
         cve: "CVE-2023-1829",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1829",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.  The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.  A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1829",
               url: "https://www.suse.com/security/cve/CVE-2023-1829",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210335 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1210335",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210619 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1210619",
            },
            {
               category: "external",
               summary: "SUSE Bug 1217444 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1217444",
            },
            {
               category: "external",
               summary: "SUSE Bug 1217531 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1217531",
            },
            {
               category: "external",
               summary: "SUSE Bug 1220886 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1220886",
            },
            {
               category: "external",
               summary: "SUSE Bug 1228311 for CVE-2023-1829",
               url: "https://bugzilla.suse.com/1228311",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1829",
      },
      {
         cve: "CVE-2023-21102",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-21102",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-21102",
               url: "https://www.suse.com/security/cve/CVE-2023-21102",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212155 for CVE-2023-21102",
               url: "https://bugzilla.suse.com/1212155",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212346 for CVE-2023-21102",
               url: "https://bugzilla.suse.com/1212346",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "important",
            },
         ],
         title: "CVE-2023-21102",
      },
      {
         cve: "CVE-2023-3090",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3090",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if  CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3090",
               url: "https://www.suse.com/security/cve/CVE-2023-3090",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212842 for CVE-2023-3090",
               url: "https://bugzilla.suse.com/1212842",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212849 for CVE-2023-3090",
               url: "https://bugzilla.suse.com/1212849",
            },
            {
               category: "external",
               summary: "SUSE Bug 1214128 for CVE-2023-3090",
               url: "https://bugzilla.suse.com/1214128",
            },
            {
               category: "external",
               summary: "SUSE Bug 1219701 for CVE-2023-3090",
               url: "https://bugzilla.suse.com/1219701",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "important",
            },
         ],
         title: "CVE-2023-3090",
      },
      {
         cve: "CVE-2023-3111",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3111",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3111",
               url: "https://www.suse.com/security/cve/CVE-2023-3111",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212051 for CVE-2023-3111",
               url: "https://bugzilla.suse.com/1212051",
            },
            {
               category: "external",
               summary: "SUSE Bug 1220015 for CVE-2023-3111",
               url: "https://bugzilla.suse.com/1220015",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3111",
      },
      {
         cve: "CVE-2023-3141",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3141",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3141",
               url: "https://www.suse.com/security/cve/CVE-2023-3141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212129 for CVE-2023-3141",
               url: "https://bugzilla.suse.com/1212129",
            },
            {
               category: "external",
               summary: "SUSE Bug 1215674 for CVE-2023-3141",
               url: "https://bugzilla.suse.com/1215674",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3141",
      },
      {
         cve: "CVE-2023-3161",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3161",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3161",
               url: "https://www.suse.com/security/cve/CVE-2023-3161",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212154 for CVE-2023-3161",
               url: "https://bugzilla.suse.com/1212154",
            },
            {
               category: "external",
               summary: "SUSE Bug 1215674 for CVE-2023-3161",
               url: "https://bugzilla.suse.com/1215674",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3161",
      },
      {
         cve: "CVE-2023-3212",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3212",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3212",
               url: "https://www.suse.com/security/cve/CVE-2023-3212",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212265 for CVE-2023-3212",
               url: "https://bugzilla.suse.com/1212265",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3212",
      },
      {
         cve: "CVE-2023-3357",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3357",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3357",
               url: "https://www.suse.com/security/cve/CVE-2023-3357",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212605 for CVE-2023-3357",
               url: "https://bugzilla.suse.com/1212605",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3357",
      },
      {
         cve: "CVE-2023-3358",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3358",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3358",
               url: "https://www.suse.com/security/cve/CVE-2023-3358",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212606 for CVE-2023-3358",
               url: "https://bugzilla.suse.com/1212606",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3358",
      },
      {
         cve: "CVE-2023-3389",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-3389",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and  0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-3389",
               url: "https://www.suse.com/security/cve/CVE-2023-3389",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212838 for CVE-2023-3389",
               url: "https://bugzilla.suse.com/1212838",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-3389",
      },
      {
         cve: "CVE-2023-35788",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-35788",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-35788",
               url: "https://www.suse.com/security/cve/CVE-2023-35788",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212504 for CVE-2023-35788",
               url: "https://bugzilla.suse.com/1212504",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212509 for CVE-2023-35788",
               url: "https://bugzilla.suse.com/1212509",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "important",
            },
         ],
         title: "CVE-2023-35788",
      },
      {
         cve: "CVE-2023-35823",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-35823",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-35823",
               url: "https://www.suse.com/security/cve/CVE-2023-35823",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212494 for CVE-2023-35823",
               url: "https://bugzilla.suse.com/1212494",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-35823",
      },
      {
         cve: "CVE-2023-35828",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-35828",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-35828",
               url: "https://www.suse.com/security/cve/CVE-2023-35828",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212513 for CVE-2023-35828",
               url: "https://bugzilla.suse.com/1212513",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-35828",
      },
      {
         cve: "CVE-2023-35829",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-35829",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
               "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-35829",
               url: "https://www.suse.com/security/cve/CVE-2023-35829",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212495 for CVE-2023-35829",
               url: "https://bugzilla.suse.com/1212495",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.55.1.noarch",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.55.1.x86_64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.aarch64",
                  "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.55.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-07-14T11:03:30Z",
               details: "moderate",
            },
         ],
         title: "CVE-2023-35829",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.