Vulnerability from csaf_suse
Published
2024-02-15 14:44
Modified
2024-02-15 14:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- Documentation: RAS: Add index and address translation section (jsc#PED-7618).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -> 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).
- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).
- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req->src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen < sg->length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req->dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip->i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernel-source: Fix description typo
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- s390: vfio-ap: tighten the NIB validity check (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
Patchnames
SUSE-2024-514,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-514,openSUSE-SLE-15.5-2024-514
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- Documentation: RAS: Add index and address translation section (jsc#PED-7618).\n- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).\n- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).\n- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)\n- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).\n- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)\n- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).\n- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).\n- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)\n- ACPI: video: check for error while searching for backlight device parent (git-fixes).\n- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).\n- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).\n- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).\n- ALSA: hda: Refer to correct stream index at loops (git-fixes).\n- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).\n- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).\n- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).\n- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).\n- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).\n- ASoC: amd: Add check for acp config flags (bsc#1219136).\n- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).\n- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).\n- ASoC: amd: Drop empty platform remove function (bsc#1219136).\n- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).\n- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).\n- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).\n- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).\n- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).\n- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).\n- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).\n- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).\n- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).\n- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).\n- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).\n- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).\n- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).\n- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).\n- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).\n- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).\n- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).\n- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).\n- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).\n- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).\n- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).\n- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).\n- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).\n- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).\n- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).\n- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).\n- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).\n- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).\n- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).\n- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).\n- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).\n- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).\n- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).\n- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).\n- ASoC: amd: add acp6.2 irq handler (bsc#1219136).\n- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).\n- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).\n- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).\n- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).\n- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).\n- ASoC: amd: fix ACP version typo mistake (bsc#1219136).\n- ASoC: amd: fix spelling mistake: 'i.e' -> 'i.e.' (bsc#1219136).\n- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).\n- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).\n- ASoC: amd: ps: Update copyright notice (bsc#1219136).\n- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).\n- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).\n- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).\n- ASoC: amd: ps: move irq handler registration (bsc#1219136).\n- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).\n- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).\n- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).\n- ASoC: amd: ps: remove unused variable (bsc#1219136).\n- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).\n- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).\n- ASoC: amd: ps: update the acp clock source (bsc#1219136).\n- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).\n- ASoC: amd: ps: use static function (bsc#1219136).\n- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).\n- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).\n- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).\n- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).\n- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).\n- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).\n- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).\n- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).\n- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).\n- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).\n- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).\n- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).\n- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).\n- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).\n- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).\n- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).\n- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).\n- ASoC: cs43130: Fix the position of const qualifier (git-fixes).\n- ASoC: da7219: Support low DC impedance headset (git-fixes).\n- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).\n- ASoC: ops: add correct range check for limiting volume (git-fixes).\n- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).\n- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).\n- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).\n- ASoC: wm8974: Correct boost mixer inputs (git-fixes).\n- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).\n- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).\n- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).\n- Documentation: Begin a RAS section (jsc#PED-7622).\n- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).\n- EDAC/amd64: Add context struct (jsc#PED-7615).\n- EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615).\n- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).\n- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).\n- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).\n- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).\n- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).\n- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).\n- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).\n- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).\n- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).\n- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).\n- EDAC/amd64: Remove module version string (jsc#PED-7615).\n- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).\n- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).\n- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).\n- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).\n- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).\n- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).\n- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).\n- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).\n- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).\n- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)\n- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).\n- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).\n- IB/iser: Prevent invalidating wrong MR (git-fixes)\n- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).\n- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).\n- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).\n- Input: xpad - add Razer Wolverine V2 support (git-fixes).\n- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).\n- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).\n- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)\n- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).\n- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).\n- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).\n- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).\n- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).\n- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).\n- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).\n- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).\n- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)\n- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)\n- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)\n- RDMA/irdma: Add wait for suspend on SQD (git-fixes)\n- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)\n- RDMA/irdma: Do not modify to SQD on error (git-fixes)\n- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)\n- RDMA/irdma: Refactor error handling in create CQP (git-fixes)\n- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)\n- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)\n- RDMA/rtrs-clt: Start hb after path_up (git-fixes)\n- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)\n- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)\n- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)\n- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)\n- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)\n- USB: xhci: workaround for grace period (git-fixes).\n- Update config files: enable ASoC AMD PS drivers (bsc#1219136)\n- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- apparmor: avoid crash when parsed profile name is empty (git-fixes).\n- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)\n- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.\n- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)\n- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)\n- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)\n- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)\n- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)\n- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)\n- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)\n- arm64: module: move find_section to header (jsc#PED-4729)\n- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)\n- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)\n- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- attr: block mode changes of symlinks (git-fixes).\n- badblocks: add helper routines for badblock ranges handling (bsc#1174649).\n- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).\n- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).\n- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).\n- badblocks: switch to the improved badblock handling code (bsc#1174649).\n- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).\n- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).\n- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).\n- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).\n- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).\n- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).\n- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).\n- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).\n- clk: samsung: Fix kernel-doc comments (git-fixes).\n- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).\n- clk: zynqmp: Add a check for NULL pointer (git-fixes).\n- clk: zynqmp: make bestdiv unsigned (git-fixes).\n- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)\n- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)\n- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)\n- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)\n- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)\n- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).\n- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).\n- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).\n- crypto: sahara - do not resize req->src when doing hash operations (git-fixes).\n- crypto: sahara - fix ahash reqsize (git-fixes).\n- crypto: sahara - fix ahash selftest failure (git-fixes).\n- crypto: sahara - fix cbc selftest failure (git-fixes).\n- crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes).\n- crypto: sahara - fix processing requests with cryptlen < sg->length (git-fixes).\n- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).\n- crypto: sahara - handle zero-length aes requests (git-fixes).\n- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).\n- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).\n- crypto: scomp - fix req->dst buffer overflow (git-fixes).\n- dma-debug: fix kernel-doc warnings (git-fixes).\n- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).\n- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).\n- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).\n- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).\n- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).\n- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).\n- drivers: clk: zynqmp: update divider round rate logic (git-fixes).\n- drm/amd/display: Fix tiled display misalignment (git-fixes).\n- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).\n- drm/amd/display: add nv12 bounding box (git-fixes).\n- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).\n- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).\n- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).\n- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).\n- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).\n- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).\n- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).\n- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/amdgpu/pm: Fix the power source flag error (git-fixes).\n- drm/amdgpu: Add NULL checks for function pointers (git-fixes).\n- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).\n- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).\n- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).\n- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).\n- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).\n- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).\n- drm/amdgpu: Let KFD sync with VM fences (git-fixes).\n- drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).\n- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).\n- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).\n- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).\n- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).\n- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).\n- drm/amdkfd: Fix lock dependency warning (git-fixes).\n- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).\n- drm/amdkfd: Use resource_size() helper function (git-fixes).\n- drm/amdkfd: fixes for HMM mem allocation (git-fixes).\n- drm/bridge: Fix typo in post_disable() description (git-fixes).\n- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).\n- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).\n- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).\n- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).\n- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).\n- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).\n- drm/bridge: tc358767: Fix return value on error case (git-fixes).\n- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).\n- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).\n- drm/crtc: fix uninitialized variable use (git-fixes).\n- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).\n- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).\n- drm/exynos: fix a potential error pointer dereference (git-fixes).\n- drm/exynos: fix a wrong error checking (git-fixes).\n- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).\n- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).\n- drm/framebuffer: Fix use of uninitialized variable (git-fixes).\n- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).\n- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).\n- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).\n- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).\n- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).\n- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).\n- drm/msm/dsi: Enable runtime PM (git-fixes).\n- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).\n- drm/msm/mdp4: flush vblank event on disable (git-fixes).\n- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).\n- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).\n- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).\n- drm/panel: nt35510: fix typo (git-fixes).\n- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).\n- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).\n- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).\n- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).\n- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).\n- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).\n- drm/radeon: check return value of radeon_ring_lock() (git-fixes).\n- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).\n- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).\n- drm/tidss: Fix atomic_flush check (git-fixes).\n- drm/tidss: Fix dss reset (git-fixes).\n- drm/tidss: Move reset to the end of dispc_init() (git-fixes).\n- drm/tidss: Return error value from from softreset (git-fixes).\n- drm/tilcdc: Fix irq free on unload (git-fixes).\n- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).\n- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).\n- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).\n- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)\n- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).\n- eventfd: prevent underflow for eventfd semaphores (git-fixes).\n- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).\n- exfat: support handle zero-size directory (git-fixes).\n- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).\n- fbdev: Only disable sysfb on the primary device (bsc#1216441)\n- fbdev: flush deferred IO before closing (git-fixes).\n- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).\n- fbdev: imxfb: fix left margin setting (git-fixes).\n- fbdev: mmp: Fix typo and wording in code comment (git-fixes).\n- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).\n- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).\n- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).\n- fjes: fix memleaks in fjes_hw_setup (git-fixes).\n- fs/mount_setattr: always cleanup mount_kattr (git-fixes).\n- fs: Fix error checking for d_hash_and_lookup() (git-fixes).\n- fs: Move notify_change permission checks into may_setattr (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: drop peer group ids under namespace lock (git-fixes).\n- fs: indicate request originates from old mount API (git-fixes).\n- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).\n- fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).\n- gfs2: Always check inode size of inline inodes (git-fixes).\n- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).\n- gfs2: Disable page faults during lockless buffered reads (git-fixes).\n- gfs2: Eliminate ip->i_gh (git-fixes).\n- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).\n- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).\n- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).\n- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).\n- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).\n- gfs2: Switch to wait_event in gfs2_logd (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: low-memory forced flush fixes (git-fixes).\n- gfs2: release iopen glock early in evict (git-fixes).\n- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).\n- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).\n- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).\n- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).\n- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).\n- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).\n- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).\n- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).\n- iio: adc: ad9467: do not ignore error codes (git-fixes).\n- iio: adc: ad9467: fix reset gpio handling (git-fixes).\n- ipmi: Use regspacings passed as a module parameter (git-fixes).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)\n- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported\n- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).\n- kernel-doc: handle a void function without producing a warning (git-fixes).\n- kernel-source: Fix description typo\n- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).\n- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).\n- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).\n- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).\n- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).\n- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).\n- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).\n- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).\n- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).\n- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).\n- media: pvrusb2: fix use after free on context disconnection (git-fixes).\n- media: rkisp1: Disable runtime PM in probe error path (git-fixes).\n- media: rkisp1: Fix media device memory leak (git-fixes).\n- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).\n- media: videobuf2-dma-sg: fix vmap callback (git-fixes).\n- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).\n- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).\n- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).\n- mmc: core: Cancel delayed work before releasing host (git-fixes).\n- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).\n- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).\n- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).\n- mtd: rawnand: pl353: Fix kernel doc (git-fixes).\n- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).\n- mtd: rawnand: rockchip: Rename a structure (git-fixes).\n- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).\n- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).\n- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).\n- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).\n- net: usb: ax88179_178a: remove redundant init code (git-fixes).\n- net: usb: ax88179_178a: restore state on resume (bsc#1218948).\n- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).\n- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).\n- nsfs: add compat ioctl handler (git-fixes).\n- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).\n- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).\n- nvme-pci: fix sleeping function called from interrupt context (git-fixes).\n- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).\n- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).\n- nvme: fix max_discard_sectors calculation (git-fixes).\n- nvme: introduce helper function to get ctrl state (git-fixes).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- nvme: trace: avoid memcpy overflow warning (git-fixes).\n- nvmet: re-fix tracing strncpy() warning (git-fixes).\n- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).\n- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).\n- parport: parport_serial: Add Brainboxes BAR details (git-fixes).\n- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).\n- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).\n- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).\n- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).\n- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).\n- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).\n- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).\n- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).\n- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).\n- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).\n- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).\n- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).\n- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).\n- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).\n- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).\n- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).\n- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).\n- powerpc/xive: Fix endian conversion size (bsc#1194869).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).\n- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).\n- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).\n- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).\n- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).\n- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).\n- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).\n- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).\n- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).\n- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).\n- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).\n- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).\n- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).\n- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).\n- s390: vfio-ap: tighten the NIB validity check (git-fixes).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Always send batch on reset or error handling command (git-fixes).\n- scsi: fnic: Return error if vmalloc() failed (git-fixes).\n- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).\n- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).\n- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).\n- scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes).\n- scsi: hisi_sas: Replace with standard error code return value (git-fixes).\n- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).\n- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).\n- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).\n- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).\n- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).\n- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).\n- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix an outdated comment (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (bsc#1219067).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).\n- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).\n- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).\n- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).\n- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).\n- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).\n- serial: imx: Correct clock error message in function probe() (git-fixes).\n- serial: imx: fix tx statemachine deadlock (git-fixes).\n- serial: max310x: fail probe if clock crystal is unstable (git-fixes).\n- serial: max310x: improve crystal stable clock detection (git-fixes).\n- serial: max310x: set default value when reading clock ready bit (git-fixes).\n- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).\n- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).\n- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).\n- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).\n- software node: Let args be NULL in software_node_get_reference_args (git-fixes).\n- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).\n- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).\n- swiotlb: fix a braino in the alignment check fix (bsc#1216559).\n- swiotlb: fix slot alignment checks (bsc#1216559).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- tracing: Add size check when printing trace_marker output (git-fixes).\n- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).\n- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).\n- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).\n- ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes).\n- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).\n- ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git-fixes).\n- uio: Fix use-after-free in uio_open (git-fixes).\n- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).\n- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).\n- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).\n- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).\n- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).\n- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).\n- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).\n- usb: otg numberpad exception (bsc#1218527).\n- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).\n- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).\n- usb: ucsi: Add missing ppm_lock (git-fixes).\n- usb: ucsi_acpi: Fix command completion handling (git-fixes).\n- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).\n- usr/Kconfig: fix typos of 'its' (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).\n- virtio-mmio: fix memory leak of vm_dev (git-fixes).\n- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).\n- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).\n- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).\n- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).\n- watchdog: set cdev owner before adding (git-fixes).\n- wifi: ath11k: Defer on rproc_get failure (git-fixes).\n- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).\n- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).\n- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).\n- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).\n- wifi: libertas: stop selecting wext (git-fixes).\n- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).\n- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).\n- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).\n- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).\n- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).\n- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).\n- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).\n- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).\n- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).\n- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).\n- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).\n- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).\n- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).\n- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).\n- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).\n- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).\n- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).\n- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).\n- xen/events: fix delayed eoi list handling (git-fixes).\n- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).\n- xhci: cleanup xhci_hub_control port references (git-fixes).\n- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).\n- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-514,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-514,openSUSE-SLE-15.5-2024-514", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0514-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0514-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240514-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0514-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1108281", url: "https://bugzilla.suse.com/1108281", }, { category: "self", summary: "SUSE Bug 1141539", url: "https://bugzilla.suse.com/1141539", }, { category: "self", summary: "SUSE Bug 1174649", url: "https://bugzilla.suse.com/1174649", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1193285", url: "https://bugzilla.suse.com/1193285", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1209834", url: "https://bugzilla.suse.com/1209834", }, { category: "self", summary: "SUSE Bug 1210443", url: "https://bugzilla.suse.com/1210443", }, { category: "self", summary: "SUSE Bug 1211515", url: "https://bugzilla.suse.com/1211515", }, { category: "self", summary: "SUSE Bug 1212091", url: "https://bugzilla.suse.com/1212091", }, { category: "self", summary: "SUSE Bug 1214377", url: "https://bugzilla.suse.com/1214377", }, { category: "self", summary: "SUSE Bug 1215275", url: "https://bugzilla.suse.com/1215275", }, { category: "self", summary: "SUSE Bug 1215885", url: "https://bugzilla.suse.com/1215885", }, { category: "self", summary: "SUSE Bug 1216441", url: "https://bugzilla.suse.com/1216441", }, { category: "self", summary: "SUSE Bug 1216559", url: "https://bugzilla.suse.com/1216559", }, { category: "self", summary: "SUSE Bug 1216702", url: "https://bugzilla.suse.com/1216702", }, { category: "self", summary: "SUSE Bug 1217895", url: "https://bugzilla.suse.com/1217895", }, { category: "self", summary: "SUSE Bug 1217987", url: "https://bugzilla.suse.com/1217987", }, { category: "self", summary: "SUSE Bug 1217988", url: "https://bugzilla.suse.com/1217988", }, { category: "self", summary: "SUSE Bug 1217989", url: "https://bugzilla.suse.com/1217989", }, { category: "self", summary: "SUSE Bug 1218005", url: "https://bugzilla.suse.com/1218005", }, { category: "self", summary: "SUSE Bug 1218447", url: "https://bugzilla.suse.com/1218447", }, { category: "self", summary: "SUSE Bug 1218527", url: "https://bugzilla.suse.com/1218527", }, { category: "self", summary: "SUSE Bug 1218659", url: "https://bugzilla.suse.com/1218659", }, { category: "self", summary: "SUSE Bug 1218689", url: "https://bugzilla.suse.com/1218689", }, { category: "self", summary: "SUSE Bug 1218713", url: "https://bugzilla.suse.com/1218713", }, { category: "self", summary: "SUSE Bug 1218723", url: "https://bugzilla.suse.com/1218723", }, { category: "self", summary: "SUSE Bug 1218730", url: "https://bugzilla.suse.com/1218730", }, { category: "self", summary: "SUSE Bug 1218738", url: "https://bugzilla.suse.com/1218738", }, { category: "self", summary: "SUSE Bug 1218752", url: "https://bugzilla.suse.com/1218752", }, { category: "self", summary: "SUSE Bug 1218757", url: "https://bugzilla.suse.com/1218757", }, { category: "self", summary: "SUSE Bug 1218768", url: "https://bugzilla.suse.com/1218768", }, { category: "self", summary: "SUSE Bug 1218778", url: "https://bugzilla.suse.com/1218778", }, { category: "self", summary: "SUSE Bug 1218779", url: "https://bugzilla.suse.com/1218779", }, { category: "self", summary: "SUSE Bug 1218804", url: "https://bugzilla.suse.com/1218804", }, { category: "self", summary: "SUSE Bug 1218832", url: "https://bugzilla.suse.com/1218832", }, { category: "self", summary: "SUSE Bug 1218836", url: "https://bugzilla.suse.com/1218836", }, { category: "self", summary: "SUSE Bug 1218916", url: "https://bugzilla.suse.com/1218916", }, { category: "self", summary: "SUSE Bug 1218948", url: "https://bugzilla.suse.com/1218948", }, { category: "self", summary: "SUSE Bug 1218958", url: "https://bugzilla.suse.com/1218958", }, { category: "self", summary: "SUSE Bug 1218968", url: "https://bugzilla.suse.com/1218968", }, { category: "self", summary: "SUSE Bug 1218997", url: "https://bugzilla.suse.com/1218997", }, { category: "self", summary: "SUSE Bug 1219006", url: "https://bugzilla.suse.com/1219006", }, { category: "self", summary: "SUSE Bug 1219012", url: "https://bugzilla.suse.com/1219012", }, { category: "self", summary: "SUSE Bug 1219013", url: "https://bugzilla.suse.com/1219013", }, { category: "self", summary: "SUSE Bug 1219014", url: "https://bugzilla.suse.com/1219014", }, { category: "self", summary: "SUSE Bug 1219053", url: "https://bugzilla.suse.com/1219053", }, { category: "self", summary: "SUSE Bug 1219067", url: "https://bugzilla.suse.com/1219067", }, { category: "self", summary: "SUSE Bug 1219120", url: "https://bugzilla.suse.com/1219120", }, { category: "self", summary: "SUSE Bug 1219128", url: "https://bugzilla.suse.com/1219128", }, { category: "self", summary: "SUSE Bug 1219136", url: "https://bugzilla.suse.com/1219136", }, { category: "self", summary: "SUSE Bug 1219285", url: "https://bugzilla.suse.com/1219285", }, { category: "self", summary: "SUSE Bug 1219349", url: "https://bugzilla.suse.com/1219349", }, { category: "self", summary: "SUSE Bug 1219412", url: "https://bugzilla.suse.com/1219412", }, { category: "self", summary: "SUSE Bug 1219429", url: "https://bugzilla.suse.com/1219429", }, { category: "self", summary: "SUSE Bug 1219434", url: "https://bugzilla.suse.com/1219434", }, { category: "self", summary: "SUSE Bug 1219490", url: "https://bugzilla.suse.com/1219490", }, { category: "self", summary: "SUSE Bug 1219512", url: "https://bugzilla.suse.com/1219512", }, { category: "self", summary: "SUSE Bug 1219568", url: "https://bugzilla.suse.com/1219568", }, { category: "self", summary: "SUSE Bug 1219582", url: "https://bugzilla.suse.com/1219582", }, { category: "self", summary: "SUSE Bug 1219608", url: "https://bugzilla.suse.com/1219608", }, { category: "self", summary: "SUSE CVE CVE-2021-33631 page", url: "https://www.suse.com/security/cve/CVE-2021-33631/", }, { category: "self", summary: "SUSE CVE CVE-2023-46838 page", url: "https://www.suse.com/security/cve/CVE-2023-46838/", }, { category: "self", summary: "SUSE CVE CVE-2023-47233 page", url: "https://www.suse.com/security/cve/CVE-2023-47233/", }, { category: "self", summary: "SUSE CVE CVE-2023-4921 page", url: "https://www.suse.com/security/cve/CVE-2023-4921/", }, { category: "self", summary: "SUSE CVE CVE-2023-51042 page", url: "https://www.suse.com/security/cve/CVE-2023-51042/", }, { category: "self", summary: "SUSE CVE CVE-2023-51043 page", url: "https://www.suse.com/security/cve/CVE-2023-51043/", }, { category: "self", summary: "SUSE CVE CVE-2023-51780 page", url: "https://www.suse.com/security/cve/CVE-2023-51780/", }, { category: "self", summary: "SUSE CVE CVE-2023-51782 page", url: "https://www.suse.com/security/cve/CVE-2023-51782/", }, { category: "self", summary: "SUSE CVE CVE-2023-6040 page", url: "https://www.suse.com/security/cve/CVE-2023-6040/", }, { category: "self", summary: "SUSE CVE CVE-2023-6356 page", url: "https://www.suse.com/security/cve/CVE-2023-6356/", }, { category: "self", summary: "SUSE CVE CVE-2023-6531 page", url: "https://www.suse.com/security/cve/CVE-2023-6531/", }, { category: "self", summary: "SUSE CVE CVE-2023-6535 page", url: "https://www.suse.com/security/cve/CVE-2023-6535/", }, { category: "self", summary: "SUSE CVE CVE-2023-6536 page", url: "https://www.suse.com/security/cve/CVE-2023-6536/", }, { category: "self", summary: "SUSE CVE CVE-2023-6915 page", url: "https://www.suse.com/security/cve/CVE-2023-6915/", }, { category: "self", summary: "SUSE CVE CVE-2024-0340 page", url: "https://www.suse.com/security/cve/CVE-2024-0340/", }, { category: "self", summary: "SUSE CVE CVE-2024-0565 page", url: "https://www.suse.com/security/cve/CVE-2024-0565/", }, { category: "self", summary: "SUSE CVE CVE-2024-0641 page", url: "https://www.suse.com/security/cve/CVE-2024-0641/", }, { category: "self", summary: "SUSE CVE CVE-2024-0775 page", url: "https://www.suse.com/security/cve/CVE-2024-0775/", }, { category: "self", summary: "SUSE CVE CVE-2024-1085 page", url: "https://www.suse.com/security/cve/CVE-2024-1085/", }, { category: "self", summary: "SUSE CVE CVE-2024-1086 page", url: "https://www.suse.com/security/cve/CVE-2024-1086/", }, { category: "self", summary: "SUSE CVE CVE-2024-24860 page", url: "https://www.suse.com/security/cve/CVE-2024-24860/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2024-02-15T14:44:16Z", generator: { date: "2024-02-15T14:44:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0514-1", initial_release_date: "2024-02-15T14:44:16Z", revision_history: [ { date: "2024-02-15T14:44:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-azure-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", product_id: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150500.33.34.1.noarch", product: { name: "kernel-source-azure-5.14.21-150500.33.34.1.noarch", product_id: "kernel-source-azure-5.14.21-150500.33.34.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.34.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.34.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.34.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2021-33631", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33631", }, ], notes: [ { category: "general", text: "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33631", url: "https://www.suse.com/security/cve/CVE-2021-33631", }, { category: "external", summary: "SUSE Bug 1219412 for CVE-2021-33631", url: "https://bugzilla.suse.com/1219412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2021-33631", }, { cve: "CVE-2023-46838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46838", }, ], notes: [ { category: "general", text: "Transmit requests in Xen's virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46838", url: "https://www.suse.com/security/cve/CVE-2023-46838", }, { category: "external", summary: "SUSE Bug 1218836 for CVE-2023-46838", url: "https://bugzilla.suse.com/1218836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-46838", }, { cve: "CVE-2023-47233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-47233", }, ], notes: [ { category: "general", text: "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-47233", url: "https://www.suse.com/security/cve/CVE-2023-47233", }, { category: "external", summary: "SUSE Bug 1216702 for CVE-2023-47233", url: "https://bugzilla.suse.com/1216702", }, { category: "external", summary: "SUSE Bug 1224592 for CVE-2023-47233", url: "https://bugzilla.suse.com/1224592", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-47233", }, { cve: "CVE-2023-4921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4921", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4921", url: "https://www.suse.com/security/cve/CVE-2023-4921", }, { category: "external", summary: "SUSE Bug 1215275 for CVE-2023-4921", url: "https://bugzilla.suse.com/1215275", }, { category: "external", summary: "SUSE Bug 1215300 for CVE-2023-4921", url: "https://bugzilla.suse.com/1215300", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-4921", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-4921", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1220906 for CVE-2023-4921", url: "https://bugzilla.suse.com/1220906", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-4921", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1224418 for CVE-2023-4921", url: "https://bugzilla.suse.com/1224418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2023-4921", }, { cve: "CVE-2023-51042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51042", }, ], notes: [ { category: "general", text: "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51042", url: "https://www.suse.com/security/cve/CVE-2023-51042", }, { category: "external", summary: "SUSE Bug 1219128 for CVE-2023-51042", url: "https://bugzilla.suse.com/1219128", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-51042", }, { cve: "CVE-2023-51043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51043", }, ], notes: [ { category: "general", text: "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51043", url: "https://www.suse.com/security/cve/CVE-2023-51043", }, { category: "external", summary: "SUSE Bug 1219120 for CVE-2023-51043", url: "https://bugzilla.suse.com/1219120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-51043", }, { cve: "CVE-2023-51780", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51780", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51780", url: "https://www.suse.com/security/cve/CVE-2023-51780", }, { category: "external", summary: "SUSE Bug 1218730 for CVE-2023-51780", url: "https://bugzilla.suse.com/1218730", }, { category: "external", summary: "SUSE Bug 1218733 for CVE-2023-51780", url: "https://bugzilla.suse.com/1218733", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-51780", url: "https://bugzilla.suse.com/1220191", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-51780", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-51780", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2023-51780", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2023-51780", url: "https://bugzilla.suse.com/1224878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2023-51780", }, { cve: "CVE-2023-51782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51782", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51782", url: "https://www.suse.com/security/cve/CVE-2023-51782", }, { category: "external", summary: "SUSE Bug 1218757 for CVE-2023-51782", url: "https://bugzilla.suse.com/1218757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-51782", }, { cve: "CVE-2023-6040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6040", }, ], notes: [ { category: "general", text: "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6040", url: "https://www.suse.com/security/cve/CVE-2023-6040", }, { category: "external", summary: "SUSE Bug 1218752 for CVE-2023-6040", url: "https://bugzilla.suse.com/1218752", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6040", }, { cve: "CVE-2023-6356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6356", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6356", url: "https://www.suse.com/security/cve/CVE-2023-6356", }, { category: "external", summary: "SUSE Bug 1217987 for CVE-2023-6356", url: "https://bugzilla.suse.com/1217987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6356", }, { cve: "CVE-2023-6531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6531", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6531", url: "https://www.suse.com/security/cve/CVE-2023-6531", }, { category: "external", summary: "SUSE Bug 1218447 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218447", }, { category: "external", summary: "SUSE Bug 1218487 for CVE-2023-6531", url: "https://bugzilla.suse.com/1218487", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6531", }, { cve: "CVE-2023-6535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6535", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6535", url: "https://www.suse.com/security/cve/CVE-2023-6535", }, { category: "external", summary: "SUSE Bug 1217988 for CVE-2023-6535", url: "https://bugzilla.suse.com/1217988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6535", }, { cve: "CVE-2023-6536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6536", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6536", url: "https://www.suse.com/security/cve/CVE-2023-6536", }, { category: "external", summary: "SUSE Bug 1217989 for CVE-2023-6536", url: "https://bugzilla.suse.com/1217989", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6536", }, { cve: "CVE-2023-6915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6915", }, ], notes: [ { category: "general", text: "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6915", url: "https://www.suse.com/security/cve/CVE-2023-6915", }, { category: "external", summary: "SUSE Bug 1218804 for CVE-2023-6915", url: "https://bugzilla.suse.com/1218804", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2023-6915", }, { cve: "CVE-2024-0340", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-0340", }, ], notes: [ { category: "general", text: "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-0340", url: "https://www.suse.com/security/cve/CVE-2024-0340", }, { category: "external", summary: "SUSE Bug 1218689 for CVE-2024-0340", url: "https://bugzilla.suse.com/1218689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "low", }, ], title: "CVE-2024-0340", }, { cve: "CVE-2024-0565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-0565", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-0565", url: "https://www.suse.com/security/cve/CVE-2024-0565", }, { category: "external", summary: "SUSE Bug 1218832 for CVE-2024-0565", url: "https://bugzilla.suse.com/1218832", }, { category: "external", summary: "SUSE Bug 1219078 for CVE-2024-0565", url: "https://bugzilla.suse.com/1219078", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2024-0565", }, { cve: "CVE-2024-0641", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-0641", }, ], notes: [ { category: "general", text: "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel's TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-0641", url: "https://www.suse.com/security/cve/CVE-2024-0641", }, { category: "external", summary: "SUSE Bug 1218916 for CVE-2024-0641", url: "https://bugzilla.suse.com/1218916", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2024-0641", }, { cve: "CVE-2024-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-0775", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-0775", url: "https://www.suse.com/security/cve/CVE-2024-0775", }, { category: "external", summary: "SUSE Bug 1219053 for CVE-2024-0775", url: "https://bugzilla.suse.com/1219053", }, { category: "external", summary: "SUSE Bug 1219082 for CVE-2024-0775", url: "https://bugzilla.suse.com/1219082", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2024-0775", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2024-0775", url: "https://bugzilla.suse.com/1224878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2024-0775", }, { cve: "CVE-2024-1085", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-1085", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-1085", url: "https://www.suse.com/security/cve/CVE-2024-1085", }, { category: "external", summary: "SUSE Bug 1219429 for CVE-2024-1085", url: "https://bugzilla.suse.com/1219429", }, { category: "external", summary: "SUSE Bug 1219432 for CVE-2024-1085", url: "https://bugzilla.suse.com/1219432", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2024-1085", }, { cve: "CVE-2024-1086", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-1086", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-1086", url: "https://www.suse.com/security/cve/CVE-2024-1086", }, { category: "external", summary: "SUSE Bug 1219434 for CVE-2024-1086", url: "https://bugzilla.suse.com/1219434", }, { category: "external", summary: "SUSE Bug 1219435 for CVE-2024-1086", url: "https://bugzilla.suse.com/1219435", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2024-1086", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2024-1086", url: "https://bugzilla.suse.com/1224878", }, { category: "external", summary: "SUSE Bug 1226066 for CVE-2024-1086", url: "https://bugzilla.suse.com/1226066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "important", }, ], title: "CVE-2024-1086", }, { cve: "CVE-2024-24860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-24860", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-24860", url: "https://www.suse.com/security/cve/CVE-2024-24860", }, { category: "external", summary: "SUSE Bug 1219608 for CVE-2024-24860", url: "https://bugzilla.suse.com/1219608", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-02-15T14:44:16Z", details: "moderate", }, ], title: "CVE-2024-24860", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.